Oct 29 05:36:51.933482 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Oct 28 23:40:27 -00 2025 Oct 29 05:36:51.933525 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 05:36:51.933544 kernel: BIOS-provided physical RAM map: Oct 29 05:36:51.933567 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 29 05:36:51.933577 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 29 05:36:51.933586 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 29 05:36:51.933598 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 29 05:36:51.933608 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 29 05:36:51.933630 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 29 05:36:51.933640 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 29 05:36:51.933654 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 29 05:36:51.933664 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 29 05:36:51.933674 kernel: NX (Execute Disable) protection: active Oct 29 05:36:51.933685 kernel: SMBIOS 2.8 present. Oct 29 05:36:51.933697 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Oct 29 05:36:51.933709 kernel: Hypervisor detected: KVM Oct 29 05:36:51.933723 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 29 05:36:51.933734 kernel: kvm-clock: cpu 0, msr 181a0001, primary cpu clock Oct 29 05:36:51.933745 kernel: kvm-clock: using sched offset of 4862383629 cycles Oct 29 05:36:51.933757 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 29 05:36:51.933768 kernel: tsc: Detected 2499.998 MHz processor Oct 29 05:36:51.933779 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 29 05:36:51.933801 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 29 05:36:51.936369 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 29 05:36:51.936382 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 29 05:36:51.936400 kernel: Using GB pages for direct mapping Oct 29 05:36:51.936411 kernel: ACPI: Early table checksum verification disabled Oct 29 05:36:51.936423 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 29 05:36:51.936434 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936445 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936457 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936468 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 29 05:36:51.936479 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936490 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936505 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936516 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 05:36:51.936527 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 29 05:36:51.936538 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 29 05:36:51.936549 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 29 05:36:51.936561 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 29 05:36:51.936578 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 29 05:36:51.936593 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 29 05:36:51.936604 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 29 05:36:51.936617 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 29 05:36:51.936629 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 29 05:36:51.936641 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 29 05:36:51.936652 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 29 05:36:51.936664 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 29 05:36:51.936680 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 29 05:36:51.936691 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 29 05:36:51.936703 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 29 05:36:51.936715 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 29 05:36:51.936727 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 29 05:36:51.936739 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 29 05:36:51.936750 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 29 05:36:51.936762 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 29 05:36:51.936798 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 29 05:36:51.936811 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 29 05:36:51.936828 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 29 05:36:51.936840 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 29 05:36:51.936852 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 29 05:36:51.936864 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 29 05:36:51.936876 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 29 05:36:51.936888 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 29 05:36:51.936900 kernel: Zone ranges: Oct 29 05:36:51.936912 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 29 05:36:51.936924 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 29 05:36:51.936939 kernel: Normal empty Oct 29 05:36:51.936951 kernel: Movable zone start for each node Oct 29 05:36:51.936963 kernel: Early memory node ranges Oct 29 05:36:51.936975 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 29 05:36:51.936987 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 29 05:36:51.936998 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 29 05:36:51.937010 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 29 05:36:51.937022 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 29 05:36:51.937034 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 29 05:36:51.937049 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 29 05:36:51.937061 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 29 05:36:51.937073 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 29 05:36:51.937084 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 29 05:36:51.937096 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 29 05:36:51.937108 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 29 05:36:51.937120 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 29 05:36:51.937131 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 29 05:36:51.937143 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 29 05:36:51.937158 kernel: TSC deadline timer available Oct 29 05:36:51.937170 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 29 05:36:51.937182 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 29 05:36:51.937207 kernel: Booting paravirtualized kernel on KVM Oct 29 05:36:51.937219 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 29 05:36:51.937231 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 29 05:36:51.937243 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 29 05:36:51.937255 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 29 05:36:51.937267 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 29 05:36:51.937282 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 29 05:36:51.937294 kernel: kvm-guest: PV spinlocks enabled Oct 29 05:36:51.937306 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 29 05:36:51.937318 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 29 05:36:51.937330 kernel: Policy zone: DMA32 Oct 29 05:36:51.937343 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 05:36:51.937355 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 29 05:36:51.937367 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 29 05:36:51.937383 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 29 05:36:51.937395 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 29 05:36:51.937407 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 29 05:36:51.937419 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 29 05:36:51.937431 kernel: Kernel/User page tables isolation: enabled Oct 29 05:36:51.937442 kernel: ftrace: allocating 34614 entries in 136 pages Oct 29 05:36:51.937454 kernel: ftrace: allocated 136 pages with 2 groups Oct 29 05:36:51.937466 kernel: rcu: Hierarchical RCU implementation. Oct 29 05:36:51.937478 kernel: rcu: RCU event tracing is enabled. Oct 29 05:36:51.937494 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 29 05:36:51.937521 kernel: Rude variant of Tasks RCU enabled. Oct 29 05:36:51.937532 kernel: Tracing variant of Tasks RCU enabled. Oct 29 05:36:51.937544 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 29 05:36:51.937555 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 29 05:36:51.937567 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 29 05:36:51.937591 kernel: random: crng init done Oct 29 05:36:51.937612 kernel: Console: colour VGA+ 80x25 Oct 29 05:36:51.937624 kernel: printk: console [tty0] enabled Oct 29 05:36:51.937636 kernel: printk: console [ttyS0] enabled Oct 29 05:36:51.937647 kernel: ACPI: Core revision 20210730 Oct 29 05:36:51.937659 kernel: APIC: Switch to symmetric I/O mode setup Oct 29 05:36:51.937673 kernel: x2apic enabled Oct 29 05:36:51.937685 kernel: Switched APIC routing to physical x2apic. Oct 29 05:36:51.937697 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 29 05:36:51.937709 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Oct 29 05:36:51.937720 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 29 05:36:51.937735 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 29 05:36:51.937747 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 29 05:36:51.937758 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 29 05:36:51.937769 kernel: Spectre V2 : Mitigation: Retpolines Oct 29 05:36:51.937794 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 29 05:36:51.937824 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Oct 29 05:36:51.937838 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 29 05:36:51.937863 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 29 05:36:51.937875 kernel: MDS: Mitigation: Clear CPU buffers Oct 29 05:36:51.937887 kernel: MMIO Stale Data: Unknown: No mitigations Oct 29 05:36:51.937899 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 29 05:36:51.937916 kernel: active return thunk: its_return_thunk Oct 29 05:36:51.937929 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 29 05:36:51.937942 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 29 05:36:51.937954 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 29 05:36:51.937966 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 29 05:36:51.937978 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 29 05:36:51.937991 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 29 05:36:51.938003 kernel: Freeing SMP alternatives memory: 32K Oct 29 05:36:51.938015 kernel: pid_max: default: 32768 minimum: 301 Oct 29 05:36:51.938027 kernel: LSM: Security Framework initializing Oct 29 05:36:51.938039 kernel: SELinux: Initializing. Oct 29 05:36:51.938055 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 05:36:51.938067 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 05:36:51.938080 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Oct 29 05:36:51.938092 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Oct 29 05:36:51.938105 kernel: signal: max sigframe size: 1776 Oct 29 05:36:51.938117 kernel: rcu: Hierarchical SRCU implementation. Oct 29 05:36:51.938130 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 29 05:36:51.938142 kernel: smp: Bringing up secondary CPUs ... Oct 29 05:36:51.938154 kernel: x86: Booting SMP configuration: Oct 29 05:36:51.938167 kernel: .... node #0, CPUs: #1 Oct 29 05:36:51.938183 kernel: kvm-clock: cpu 1, msr 181a0041, secondary cpu clock Oct 29 05:36:51.938207 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 29 05:36:51.938219 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 29 05:36:51.938232 kernel: smp: Brought up 1 node, 2 CPUs Oct 29 05:36:51.938244 kernel: smpboot: Max logical packages: 16 Oct 29 05:36:51.938256 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Oct 29 05:36:51.938268 kernel: devtmpfs: initialized Oct 29 05:36:51.938281 kernel: x86/mm: Memory block size: 128MB Oct 29 05:36:51.938293 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 29 05:36:51.938310 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 29 05:36:51.938323 kernel: pinctrl core: initialized pinctrl subsystem Oct 29 05:36:51.938335 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 29 05:36:51.938347 kernel: audit: initializing netlink subsys (disabled) Oct 29 05:36:51.938360 kernel: audit: type=2000 audit(1761716210.746:1): state=initialized audit_enabled=0 res=1 Oct 29 05:36:51.938372 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 29 05:36:51.938384 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 29 05:36:51.938397 kernel: cpuidle: using governor menu Oct 29 05:36:51.938409 kernel: ACPI: bus type PCI registered Oct 29 05:36:51.938425 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 29 05:36:51.938438 kernel: dca service started, version 1.12.1 Oct 29 05:36:51.938450 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 29 05:36:51.938463 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 29 05:36:51.938475 kernel: PCI: Using configuration type 1 for base access Oct 29 05:36:51.938488 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 29 05:36:51.938500 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 29 05:36:51.938512 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 29 05:36:51.938525 kernel: ACPI: Added _OSI(Module Device) Oct 29 05:36:51.938540 kernel: ACPI: Added _OSI(Processor Device) Oct 29 05:36:51.938553 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 29 05:36:51.938565 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 29 05:36:51.938577 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 29 05:36:51.938602 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 29 05:36:51.938614 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 29 05:36:51.938626 kernel: ACPI: Interpreter enabled Oct 29 05:36:51.938638 kernel: ACPI: PM: (supports S0 S5) Oct 29 05:36:51.938649 kernel: ACPI: Using IOAPIC for interrupt routing Oct 29 05:36:51.938665 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 29 05:36:51.938677 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 29 05:36:51.938689 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 29 05:36:51.938988 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 29 05:36:51.939156 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 29 05:36:51.939328 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 29 05:36:51.939348 kernel: PCI host bridge to bus 0000:00 Oct 29 05:36:51.939543 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 29 05:36:51.939692 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 29 05:36:51.939872 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 29 05:36:51.940026 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 29 05:36:51.940170 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 29 05:36:51.940328 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 29 05:36:51.940473 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 29 05:36:51.940664 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 29 05:36:51.943907 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 29 05:36:51.944086 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 29 05:36:51.944268 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 29 05:36:51.944430 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 29 05:36:51.944590 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 29 05:36:51.946842 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.947034 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 29 05:36:51.947235 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.947405 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 29 05:36:51.947579 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.947742 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 29 05:36:51.947967 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.948129 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 29 05:36:51.948350 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.948512 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 29 05:36:51.948680 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.949940 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 29 05:36:51.950119 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.950305 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 29 05:36:51.950480 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 29 05:36:51.950640 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 29 05:36:51.950822 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 29 05:36:51.950984 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 29 05:36:51.951144 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 29 05:36:51.951323 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 29 05:36:51.951482 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 29 05:36:51.951654 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 29 05:36:51.951831 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 29 05:36:51.952013 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 29 05:36:51.952171 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 29 05:36:51.952355 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 29 05:36:51.952522 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 29 05:36:51.952692 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 29 05:36:51.952876 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Oct 29 05:36:51.953037 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 29 05:36:51.953263 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 29 05:36:51.953425 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 29 05:36:51.953604 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 29 05:36:51.960834 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 29 05:36:51.961066 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 05:36:51.961265 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 05:36:51.961444 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 05:36:51.961636 kernel: pci_bus 0000:02: extended config space not accessible Oct 29 05:36:51.961875 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 29 05:36:51.962085 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 29 05:36:51.962299 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 05:36:51.962496 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 05:36:51.962692 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 29 05:36:51.962903 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 29 05:36:51.963090 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 05:36:51.963283 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 05:36:51.963442 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 05:36:51.963618 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 29 05:36:51.963806 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 29 05:36:51.963971 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 05:36:51.964128 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 05:36:51.964301 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 05:36:51.964462 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 05:36:51.964628 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 05:36:51.964802 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 05:36:51.964966 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 05:36:51.965130 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 05:36:51.965305 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 05:36:51.965467 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 05:36:51.965625 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 05:36:51.965815 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 05:36:51.965986 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 05:36:51.966145 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 05:36:51.966319 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 05:36:51.966481 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 05:36:51.966640 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 05:36:51.973847 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 05:36:51.973874 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 29 05:36:51.973889 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 29 05:36:51.973910 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 29 05:36:51.973923 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 29 05:36:51.973936 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 29 05:36:51.973949 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 29 05:36:51.973962 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 29 05:36:51.973975 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 29 05:36:51.973987 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 29 05:36:51.974000 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 29 05:36:51.974013 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 29 05:36:51.974030 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 29 05:36:51.974043 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 29 05:36:51.974056 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 29 05:36:51.974068 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 29 05:36:51.974081 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 29 05:36:51.974093 kernel: iommu: Default domain type: Translated Oct 29 05:36:51.974106 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 29 05:36:51.974296 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 29 05:36:51.974461 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 29 05:36:51.974629 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 29 05:36:51.974649 kernel: vgaarb: loaded Oct 29 05:36:51.974662 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 29 05:36:51.974675 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 29 05:36:51.974687 kernel: PTP clock support registered Oct 29 05:36:51.974700 kernel: PCI: Using ACPI for IRQ routing Oct 29 05:36:51.974712 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 29 05:36:51.974725 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 29 05:36:51.974743 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 29 05:36:51.974756 kernel: clocksource: Switched to clocksource kvm-clock Oct 29 05:36:51.974787 kernel: VFS: Disk quotas dquot_6.6.0 Oct 29 05:36:51.974801 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 29 05:36:51.974813 kernel: pnp: PnP ACPI init Oct 29 05:36:51.975022 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 29 05:36:51.975044 kernel: pnp: PnP ACPI: found 5 devices Oct 29 05:36:51.975057 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 29 05:36:51.975070 kernel: NET: Registered PF_INET protocol family Oct 29 05:36:51.975089 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 29 05:36:51.975102 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 29 05:36:51.975115 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 29 05:36:51.975128 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 29 05:36:51.975140 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 29 05:36:51.975153 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 29 05:36:51.975166 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 05:36:51.975179 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 05:36:51.975209 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 29 05:36:51.975222 kernel: NET: Registered PF_XDP protocol family Oct 29 05:36:51.975385 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Oct 29 05:36:51.975548 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 29 05:36:51.975710 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 29 05:36:51.975886 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 29 05:36:51.976046 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 29 05:36:51.976226 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 29 05:36:51.976389 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 29 05:36:51.976549 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 29 05:36:51.976708 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Oct 29 05:36:51.976882 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Oct 29 05:36:51.977042 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Oct 29 05:36:51.977212 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Oct 29 05:36:51.977393 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Oct 29 05:36:51.977554 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Oct 29 05:36:51.977713 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Oct 29 05:36:51.977887 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Oct 29 05:36:51.978055 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 05:36:51.978299 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 05:36:51.978481 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 05:36:51.978641 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Oct 29 05:36:51.978843 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 05:36:51.979016 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 05:36:51.979232 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 05:36:51.979399 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Oct 29 05:36:51.979561 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 05:36:51.979724 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 05:36:51.979919 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 05:36:51.980081 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Oct 29 05:36:51.980259 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 05:36:51.980429 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 05:36:51.980613 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 05:36:51.984892 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Oct 29 05:36:51.985078 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 05:36:51.985264 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 05:36:51.985450 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 05:36:51.985625 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Oct 29 05:36:51.985808 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 05:36:51.985972 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 05:36:51.986160 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 05:36:51.986338 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Oct 29 05:36:51.986498 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 05:36:51.986658 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 05:36:51.986852 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 05:36:51.987023 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Oct 29 05:36:51.987183 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 05:36:51.987358 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 05:36:51.987538 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 05:36:51.987701 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Oct 29 05:36:51.987882 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 05:36:51.988042 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 05:36:51.988224 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 29 05:36:51.988373 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 29 05:36:51.988519 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 29 05:36:51.988664 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 29 05:36:51.988847 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 29 05:36:51.988994 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 29 05:36:51.989206 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Oct 29 05:36:51.989380 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 29 05:36:51.989543 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 05:36:51.989719 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 29 05:36:51.989923 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Oct 29 05:36:51.990108 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 29 05:36:51.990279 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 05:36:51.990476 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Oct 29 05:36:51.990635 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 29 05:36:51.990811 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 05:36:51.990987 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 29 05:36:51.991142 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 29 05:36:51.991316 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 05:36:51.991489 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Oct 29 05:36:51.991655 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 29 05:36:51.998900 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 05:36:51.999086 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Oct 29 05:36:51.999264 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 29 05:36:51.999418 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 05:36:51.999610 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Oct 29 05:36:51.999792 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 29 05:36:51.999951 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 05:36:52.000132 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Oct 29 05:36:52.000302 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 29 05:36:52.000456 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 05:36:52.000477 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 29 05:36:52.000491 kernel: PCI: CLS 0 bytes, default 64 Oct 29 05:36:52.000505 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 29 05:36:52.000526 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 29 05:36:52.000539 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 29 05:36:52.000553 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 29 05:36:52.000567 kernel: Initialise system trusted keyrings Oct 29 05:36:52.000580 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 29 05:36:52.000593 kernel: Key type asymmetric registered Oct 29 05:36:52.000606 kernel: Asymmetric key parser 'x509' registered Oct 29 05:36:52.000619 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 29 05:36:52.000633 kernel: io scheduler mq-deadline registered Oct 29 05:36:52.000651 kernel: io scheduler kyber registered Oct 29 05:36:52.000664 kernel: io scheduler bfq registered Oct 29 05:36:52.000841 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 29 05:36:52.001006 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 29 05:36:52.001168 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.001356 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 29 05:36:52.001518 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 29 05:36:52.001687 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.001873 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 29 05:36:52.002045 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 29 05:36:52.002226 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.002398 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 29 05:36:52.002559 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 29 05:36:52.002727 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.002913 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 29 05:36:52.003074 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 29 05:36:52.003251 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.003415 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 29 05:36:52.003575 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 29 05:36:52.003742 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.003920 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 29 05:36:52.004083 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 29 05:36:52.004259 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.004422 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 29 05:36:52.004582 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 29 05:36:52.004780 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 05:36:52.004803 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 29 05:36:52.004818 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 29 05:36:52.004832 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 29 05:36:52.004845 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 29 05:36:52.004859 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 29 05:36:52.004872 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 29 05:36:52.004892 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 29 05:36:52.004910 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 29 05:36:52.005100 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 29 05:36:52.005122 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 29 05:36:52.005296 kernel: rtc_cmos 00:03: registered as rtc0 Oct 29 05:36:52.005461 kernel: rtc_cmos 00:03: setting system clock to 2025-10-29T05:36:51 UTC (1761716211) Oct 29 05:36:52.005626 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 29 05:36:52.005647 kernel: intel_pstate: CPU model not supported Oct 29 05:36:52.005660 kernel: NET: Registered PF_INET6 protocol family Oct 29 05:36:52.005680 kernel: Segment Routing with IPv6 Oct 29 05:36:52.005694 kernel: In-situ OAM (IOAM) with IPv6 Oct 29 05:36:52.005707 kernel: NET: Registered PF_PACKET protocol family Oct 29 05:36:52.005720 kernel: Key type dns_resolver registered Oct 29 05:36:52.005733 kernel: IPI shorthand broadcast: enabled Oct 29 05:36:52.005747 kernel: sched_clock: Marking stable (983178447, 222142102)->(1491485957, -286165408) Oct 29 05:36:52.005760 kernel: registered taskstats version 1 Oct 29 05:36:52.012090 kernel: Loading compiled-in X.509 certificates Oct 29 05:36:52.012108 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 88bc8a4d729b2f514b4a44a35b666d3248ded14a' Oct 29 05:36:52.012130 kernel: Key type .fscrypt registered Oct 29 05:36:52.012143 kernel: Key type fscrypt-provisioning registered Oct 29 05:36:52.012157 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 29 05:36:52.012170 kernel: ima: Allocated hash algorithm: sha1 Oct 29 05:36:52.012184 kernel: ima: No architecture policies found Oct 29 05:36:52.012210 kernel: clk: Disabling unused clocks Oct 29 05:36:52.012223 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 29 05:36:52.012237 kernel: Write protecting the kernel read-only data: 28672k Oct 29 05:36:52.012255 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 29 05:36:52.012269 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 29 05:36:52.012282 kernel: Run /init as init process Oct 29 05:36:52.012296 kernel: with arguments: Oct 29 05:36:52.012309 kernel: /init Oct 29 05:36:52.012322 kernel: with environment: Oct 29 05:36:52.012335 kernel: HOME=/ Oct 29 05:36:52.012348 kernel: TERM=linux Oct 29 05:36:52.012360 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 29 05:36:52.012384 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 05:36:52.012408 systemd[1]: Detected virtualization kvm. Oct 29 05:36:52.012423 systemd[1]: Detected architecture x86-64. Oct 29 05:36:52.012437 systemd[1]: Running in initrd. Oct 29 05:36:52.012450 systemd[1]: No hostname configured, using default hostname. Oct 29 05:36:52.012464 systemd[1]: Hostname set to . Oct 29 05:36:52.012478 systemd[1]: Initializing machine ID from VM UUID. Oct 29 05:36:52.012492 systemd[1]: Queued start job for default target initrd.target. Oct 29 05:36:52.012511 systemd[1]: Started systemd-ask-password-console.path. Oct 29 05:36:52.012525 systemd[1]: Reached target cryptsetup.target. Oct 29 05:36:52.012538 systemd[1]: Reached target paths.target. Oct 29 05:36:52.012552 systemd[1]: Reached target slices.target. Oct 29 05:36:52.012566 systemd[1]: Reached target swap.target. Oct 29 05:36:52.012580 systemd[1]: Reached target timers.target. Oct 29 05:36:52.012595 systemd[1]: Listening on iscsid.socket. Oct 29 05:36:52.012613 systemd[1]: Listening on iscsiuio.socket. Oct 29 05:36:52.012627 systemd[1]: Listening on systemd-journald-audit.socket. Oct 29 05:36:52.012641 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 29 05:36:52.012655 systemd[1]: Listening on systemd-journald.socket. Oct 29 05:36:52.012669 systemd[1]: Listening on systemd-networkd.socket. Oct 29 05:36:52.012683 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 05:36:52.012697 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 05:36:52.012711 systemd[1]: Reached target sockets.target. Oct 29 05:36:52.012725 systemd[1]: Starting kmod-static-nodes.service... Oct 29 05:36:52.012743 systemd[1]: Finished network-cleanup.service. Oct 29 05:36:52.012758 systemd[1]: Starting systemd-fsck-usr.service... Oct 29 05:36:52.012790 systemd[1]: Starting systemd-journald.service... Oct 29 05:36:52.012810 systemd[1]: Starting systemd-modules-load.service... Oct 29 05:36:52.012825 systemd[1]: Starting systemd-resolved.service... Oct 29 05:36:52.012839 systemd[1]: Starting systemd-vconsole-setup.service... Oct 29 05:36:52.012853 systemd[1]: Finished kmod-static-nodes.service. Oct 29 05:36:52.012867 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 29 05:36:52.012895 systemd-journald[201]: Journal started Oct 29 05:36:52.012991 systemd-journald[201]: Runtime Journal (/run/log/journal/a6caab679dcc4d97b1e814dfd9fb809d) is 4.7M, max 38.1M, 33.3M free. Oct 29 05:36:51.940805 systemd-modules-load[202]: Inserted module 'overlay' Oct 29 05:36:52.039004 kernel: Bridge firewalling registered Oct 29 05:36:52.039038 systemd[1]: Started systemd-resolved.service. Oct 29 05:36:52.039061 kernel: audit: type=1130 audit(1761716212.031:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:51.990302 systemd-resolved[203]: Positive Trust Anchors: Oct 29 05:36:51.990325 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 05:36:51.990371 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 05:36:52.047830 kernel: SCSI subsystem initialized Oct 29 05:36:52.047857 systemd[1]: Started systemd-journald.service. Oct 29 05:36:51.994331 systemd-resolved[203]: Defaulting to hostname 'linux'. Oct 29 05:36:52.019241 systemd-modules-load[202]: Inserted module 'br_netfilter' Oct 29 05:36:52.057861 kernel: audit: type=1130 audit(1761716212.043:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.049297 systemd[1]: Finished systemd-fsck-usr.service. Oct 29 05:36:52.074021 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 29 05:36:52.074053 kernel: audit: type=1130 audit(1761716212.048:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.074073 kernel: device-mapper: uevent: version 1.0.3 Oct 29 05:36:52.074099 kernel: audit: type=1130 audit(1761716212.049:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.050923 systemd[1]: Reached target nss-lookup.target. Oct 29 05:36:52.058306 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 05:36:52.077886 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 29 05:36:52.061287 systemd[1]: Finished systemd-vconsole-setup.service. Oct 29 05:36:52.083835 kernel: audit: type=1130 audit(1761716212.077:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.078890 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 05:36:52.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.085818 systemd[1]: Starting dracut-cmdline-ask.service... Oct 29 05:36:52.091407 kernel: audit: type=1130 audit(1761716212.083:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.090472 systemd-modules-load[202]: Inserted module 'dm_multipath' Oct 29 05:36:52.092472 systemd[1]: Finished systemd-modules-load.service. Oct 29 05:36:52.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.094588 systemd[1]: Starting systemd-sysctl.service... Oct 29 05:36:52.100238 kernel: audit: type=1130 audit(1761716212.092:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.113014 systemd[1]: Finished systemd-sysctl.service. Oct 29 05:36:52.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.119632 systemd[1]: Finished dracut-cmdline-ask.service. Oct 29 05:36:52.120933 kernel: audit: type=1130 audit(1761716212.112:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.121421 systemd[1]: Starting dracut-cmdline.service... Oct 29 05:36:52.140523 kernel: audit: type=1130 audit(1761716212.119:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.140555 dracut-cmdline[226]: dracut-dracut-053 Oct 29 05:36:52.140555 dracut-cmdline[226]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 29 05:36:52.140555 dracut-cmdline[226]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 05:36:52.225843 kernel: Loading iSCSI transport class v2.0-870. Oct 29 05:36:52.247800 kernel: iscsi: registered transport (tcp) Oct 29 05:36:52.276142 kernel: iscsi: registered transport (qla4xxx) Oct 29 05:36:52.276245 kernel: QLogic iSCSI HBA Driver Oct 29 05:36:52.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.324910 systemd[1]: Finished dracut-cmdline.service. Oct 29 05:36:52.327836 systemd[1]: Starting dracut-pre-udev.service... Oct 29 05:36:52.385856 kernel: raid6: sse2x4 gen() 13817 MB/s Oct 29 05:36:52.403810 kernel: raid6: sse2x4 xor() 7824 MB/s Oct 29 05:36:52.421813 kernel: raid6: sse2x2 gen() 9788 MB/s Oct 29 05:36:52.439826 kernel: raid6: sse2x2 xor() 8060 MB/s Oct 29 05:36:52.457844 kernel: raid6: sse2x1 gen() 10199 MB/s Oct 29 05:36:52.476524 kernel: raid6: sse2x1 xor() 7224 MB/s Oct 29 05:36:52.476602 kernel: raid6: using algorithm sse2x4 gen() 13817 MB/s Oct 29 05:36:52.476622 kernel: raid6: .... xor() 7824 MB/s, rmw enabled Oct 29 05:36:52.477815 kernel: raid6: using ssse3x2 recovery algorithm Oct 29 05:36:52.495825 kernel: xor: automatically using best checksumming function avx Oct 29 05:36:52.611841 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 29 05:36:52.624473 systemd[1]: Finished dracut-pre-udev.service. Oct 29 05:36:52.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.624000 audit: BPF prog-id=7 op=LOAD Oct 29 05:36:52.625000 audit: BPF prog-id=8 op=LOAD Oct 29 05:36:52.626450 systemd[1]: Starting systemd-udevd.service... Oct 29 05:36:52.644575 systemd-udevd[403]: Using default interface naming scheme 'v252'. Oct 29 05:36:52.653671 systemd[1]: Started systemd-udevd.service. Oct 29 05:36:52.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.659367 systemd[1]: Starting dracut-pre-trigger.service... Oct 29 05:36:52.677058 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Oct 29 05:36:52.716399 systemd[1]: Finished dracut-pre-trigger.service. Oct 29 05:36:52.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.718206 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 05:36:52.814049 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 05:36:52.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:52.916070 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 29 05:36:52.963501 kernel: cryptd: max_cpu_qlen set to 1000 Oct 29 05:36:52.963543 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 29 05:36:52.963565 kernel: GPT:17805311 != 125829119 Oct 29 05:36:52.963582 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 29 05:36:52.963599 kernel: GPT:17805311 != 125829119 Oct 29 05:36:52.963615 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 29 05:36:52.963632 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 05:36:52.969791 kernel: AVX version of gcm_enc/dec engaged. Oct 29 05:36:52.971787 kernel: AES CTR mode by8 optimization enabled Oct 29 05:36:52.999793 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (458) Oct 29 05:36:53.005796 kernel: ACPI: bus type USB registered Oct 29 05:36:53.006256 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 29 05:36:53.123274 kernel: usbcore: registered new interface driver usbfs Oct 29 05:36:53.123315 kernel: usbcore: registered new interface driver hub Oct 29 05:36:53.123334 kernel: usbcore: registered new device driver usb Oct 29 05:36:53.123351 kernel: libata version 3.00 loaded. Oct 29 05:36:53.123369 kernel: ahci 0000:00:1f.2: version 3.0 Oct 29 05:36:53.123635 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 29 05:36:53.123658 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 29 05:36:53.123863 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 29 05:36:53.124044 kernel: scsi host0: ahci Oct 29 05:36:53.124264 kernel: scsi host1: ahci Oct 29 05:36:53.124458 kernel: scsi host2: ahci Oct 29 05:36:53.124671 kernel: scsi host3: ahci Oct 29 05:36:53.124901 kernel: scsi host4: ahci Oct 29 05:36:53.125087 kernel: scsi host5: ahci Oct 29 05:36:53.125289 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Oct 29 05:36:53.125309 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Oct 29 05:36:53.125326 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Oct 29 05:36:53.125342 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Oct 29 05:36:53.125359 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Oct 29 05:36:53.125381 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Oct 29 05:36:53.127234 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 29 05:36:53.135229 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 29 05:36:53.136018 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 29 05:36:53.143152 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 05:36:53.145076 systemd[1]: Starting disk-uuid.service... Oct 29 05:36:53.151702 disk-uuid[529]: Primary Header is updated. Oct 29 05:36:53.151702 disk-uuid[529]: Secondary Entries is updated. Oct 29 05:36:53.151702 disk-uuid[529]: Secondary Header is updated. Oct 29 05:36:53.155792 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 05:36:53.162793 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 05:36:53.357815 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.357907 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.359928 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.361580 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.370145 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.370194 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 29 05:36:53.375793 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 05:36:53.399118 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 29 05:36:53.399340 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 29 05:36:53.399527 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 05:36:53.399709 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 29 05:36:53.399925 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 29 05:36:53.400106 kernel: hub 1-0:1.0: USB hub found Oct 29 05:36:53.400334 kernel: hub 1-0:1.0: 4 ports detected Oct 29 05:36:53.400541 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 29 05:36:53.400754 kernel: hub 2-0:1.0: USB hub found Oct 29 05:36:53.400987 kernel: hub 2-0:1.0: 4 ports detected Oct 29 05:36:53.632807 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 29 05:36:53.773794 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 29 05:36:53.780439 kernel: usbcore: registered new interface driver usbhid Oct 29 05:36:53.780477 kernel: usbhid: USB HID core driver Oct 29 05:36:53.789786 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Oct 29 05:36:53.789827 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 29 05:36:54.167805 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 05:36:54.168306 disk-uuid[530]: The operation has completed successfully. Oct 29 05:36:54.225119 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 29 05:36:54.225293 systemd[1]: Finished disk-uuid.service. Oct 29 05:36:54.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.231905 systemd[1]: Starting verity-setup.service... Oct 29 05:36:54.254801 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Oct 29 05:36:54.310164 systemd[1]: Found device dev-mapper-usr.device. Oct 29 05:36:54.312135 systemd[1]: Mounting sysusr-usr.mount... Oct 29 05:36:54.314123 systemd[1]: Finished verity-setup.service. Oct 29 05:36:54.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.407819 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 29 05:36:54.408089 systemd[1]: Mounted sysusr-usr.mount. Oct 29 05:36:54.408940 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 29 05:36:54.409920 systemd[1]: Starting ignition-setup.service... Oct 29 05:36:54.413330 systemd[1]: Starting parse-ip-for-networkd.service... Oct 29 05:36:54.428129 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 05:36:54.428187 kernel: BTRFS info (device vda6): using free space tree Oct 29 05:36:54.428209 kernel: BTRFS info (device vda6): has skinny extents Oct 29 05:36:54.449642 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 29 05:36:54.455167 systemd[1]: Finished ignition-setup.service. Oct 29 05:36:54.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.457847 systemd[1]: Starting ignition-fetch-offline.service... Oct 29 05:36:54.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.565000 audit: BPF prog-id=9 op=LOAD Oct 29 05:36:54.564035 systemd[1]: Finished parse-ip-for-networkd.service. Oct 29 05:36:54.568813 systemd[1]: Starting systemd-networkd.service... Oct 29 05:36:54.624643 systemd-networkd[710]: lo: Link UP Oct 29 05:36:54.624655 systemd-networkd[710]: lo: Gained carrier Oct 29 05:36:54.625705 systemd-networkd[710]: Enumeration completed Oct 29 05:36:54.626115 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 05:36:54.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.627924 systemd-networkd[710]: eth0: Link UP Oct 29 05:36:54.627931 systemd-networkd[710]: eth0: Gained carrier Oct 29 05:36:54.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.628342 systemd[1]: Started systemd-networkd.service. Oct 29 05:36:54.629378 systemd[1]: Reached target network.target. Oct 29 05:36:54.632387 systemd[1]: Starting iscsiuio.service... Oct 29 05:36:54.648316 systemd[1]: Started iscsiuio.service. Oct 29 05:36:54.650130 systemd[1]: Starting iscsid.service... Oct 29 05:36:54.655415 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 29 05:36:54.655415 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 29 05:36:54.655415 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 29 05:36:54.655415 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 29 05:36:54.655415 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 29 05:36:54.655415 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 29 05:36:54.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.658908 systemd[1]: Started iscsid.service. Oct 29 05:36:54.658976 ignition[630]: Ignition 2.14.0 Oct 29 05:36:54.660966 systemd[1]: Starting dracut-initqueue.service... Oct 29 05:36:54.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.658999 ignition[630]: Stage: fetch-offline Oct 29 05:36:54.667065 systemd[1]: Finished ignition-fetch-offline.service. Oct 29 05:36:54.659111 ignition[630]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:54.670032 systemd[1]: Starting ignition-fetch.service... Oct 29 05:36:54.659164 ignition[630]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:54.660963 ignition[630]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:54.661148 ignition[630]: parsed url from cmdline: "" Oct 29 05:36:54.661158 ignition[630]: no config URL provided Oct 29 05:36:54.661168 ignition[630]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 05:36:54.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.661185 ignition[630]: no config at "/usr/lib/ignition/user.ign" Oct 29 05:36:54.682275 systemd[1]: Finished dracut-initqueue.service. Oct 29 05:36:54.661194 ignition[630]: failed to fetch config: resource requires networking Oct 29 05:36:54.683375 systemd[1]: Reached target remote-fs-pre.target. Oct 29 05:36:54.661530 ignition[630]: Ignition finished successfully Oct 29 05:36:54.683984 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 05:36:54.685435 ignition[717]: Ignition 2.14.0 Oct 29 05:36:54.684643 systemd[1]: Reached target remote-fs.target. Oct 29 05:36:54.685446 ignition[717]: Stage: fetch Oct 29 05:36:54.686397 systemd[1]: Starting dracut-pre-mount.service... Oct 29 05:36:54.685602 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:54.691929 systemd-networkd[710]: eth0: DHCPv4 address 10.244.11.46/30, gateway 10.244.11.45 acquired from 10.244.11.45 Oct 29 05:36:54.685636 ignition[717]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:54.691620 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:54.691784 ignition[717]: parsed url from cmdline: "" Oct 29 05:36:54.694660 ignition[717]: no config URL provided Oct 29 05:36:54.694673 ignition[717]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 05:36:54.694691 ignition[717]: no config at "/usr/lib/ignition/user.ign" Oct 29 05:36:54.698042 ignition[717]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 29 05:36:54.698075 ignition[717]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 29 05:36:54.699623 ignition[717]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 29 05:36:54.707119 systemd[1]: Finished dracut-pre-mount.service. Oct 29 05:36:54.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.720180 ignition[717]: GET result: OK Oct 29 05:36:54.721057 ignition[717]: parsing config with SHA512: 594d705410c6d5fb6f3aa9d34d2d84863787e259a559a135507c24a3c6563b1e7629495df7c8816e106aadfd91abb22c74b1307fa7ec6cd37b4c6abf74a086f3 Oct 29 05:36:54.730669 unknown[717]: fetched base config from "system" Oct 29 05:36:54.731523 unknown[717]: fetched base config from "system" Oct 29 05:36:54.732337 unknown[717]: fetched user config from "openstack" Oct 29 05:36:54.733609 ignition[717]: fetch: fetch complete Oct 29 05:36:54.734370 ignition[717]: fetch: fetch passed Oct 29 05:36:54.735093 ignition[717]: Ignition finished successfully Oct 29 05:36:54.737485 systemd[1]: Finished ignition-fetch.service. Oct 29 05:36:54.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.739480 systemd[1]: Starting ignition-kargs.service... Oct 29 05:36:54.751895 ignition[735]: Ignition 2.14.0 Oct 29 05:36:54.751911 ignition[735]: Stage: kargs Oct 29 05:36:54.752084 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:54.752118 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:54.753450 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:54.755019 ignition[735]: kargs: kargs passed Oct 29 05:36:54.756015 systemd[1]: Finished ignition-kargs.service. Oct 29 05:36:54.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.755091 ignition[735]: Ignition finished successfully Oct 29 05:36:54.757808 systemd[1]: Starting ignition-disks.service... Oct 29 05:36:54.768501 ignition[740]: Ignition 2.14.0 Oct 29 05:36:54.768524 ignition[740]: Stage: disks Oct 29 05:36:54.768675 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:54.768709 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:54.770252 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:54.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.772450 systemd[1]: Finished ignition-disks.service. Oct 29 05:36:54.771393 ignition[740]: disks: disks passed Oct 29 05:36:54.773575 systemd[1]: Reached target initrd-root-device.target. Oct 29 05:36:54.771456 ignition[740]: Ignition finished successfully Oct 29 05:36:54.774251 systemd[1]: Reached target local-fs-pre.target. Oct 29 05:36:54.775470 systemd[1]: Reached target local-fs.target. Oct 29 05:36:54.776687 systemd[1]: Reached target sysinit.target. Oct 29 05:36:54.777923 systemd[1]: Reached target basic.target. Oct 29 05:36:54.780269 systemd[1]: Starting systemd-fsck-root.service... Oct 29 05:36:54.800843 systemd-fsck[747]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 29 05:36:54.805195 systemd[1]: Finished systemd-fsck-root.service. Oct 29 05:36:54.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.806960 systemd[1]: Mounting sysroot.mount... Oct 29 05:36:54.821808 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 29 05:36:54.822066 systemd[1]: Mounted sysroot.mount. Oct 29 05:36:54.822823 systemd[1]: Reached target initrd-root-fs.target. Oct 29 05:36:54.825646 systemd[1]: Mounting sysroot-usr.mount... Oct 29 05:36:54.826906 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 29 05:36:54.827901 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 29 05:36:54.830974 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 29 05:36:54.831018 systemd[1]: Reached target ignition-diskful.target. Oct 29 05:36:54.834038 systemd[1]: Mounted sysroot-usr.mount. Oct 29 05:36:54.836471 systemd[1]: Starting initrd-setup-root.service... Oct 29 05:36:54.845591 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Oct 29 05:36:54.860407 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Oct 29 05:36:54.870280 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Oct 29 05:36:54.877789 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Oct 29 05:36:54.939999 systemd[1]: Finished initrd-setup-root.service. Oct 29 05:36:54.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.942039 systemd[1]: Starting ignition-mount.service... Oct 29 05:36:54.943623 systemd[1]: Starting sysroot-boot.service... Oct 29 05:36:54.956878 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Oct 29 05:36:54.982037 ignition[802]: INFO : Ignition 2.14.0 Oct 29 05:36:54.982037 ignition[802]: INFO : Stage: mount Oct 29 05:36:54.983690 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:54.983690 ignition[802]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:54.983690 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:54.988165 ignition[802]: INFO : mount: mount passed Oct 29 05:36:54.988165 ignition[802]: INFO : Ignition finished successfully Oct 29 05:36:54.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.986734 systemd[1]: Finished ignition-mount.service. Oct 29 05:36:54.994540 systemd[1]: Finished sysroot-boot.service. Oct 29 05:36:54.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:54.996977 coreos-metadata[753]: Oct 29 05:36:54.996 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 29 05:36:55.017148 coreos-metadata[753]: Oct 29 05:36:55.017 INFO Fetch successful Oct 29 05:36:55.018083 coreos-metadata[753]: Oct 29 05:36:55.017 INFO wrote hostname srv-gd80c.gb1.brightbox.com to /sysroot/etc/hostname Oct 29 05:36:55.021177 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 29 05:36:55.021336 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 29 05:36:55.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:55.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:55.333749 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 05:36:55.349801 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (810) Oct 29 05:36:55.354818 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 05:36:55.354861 kernel: BTRFS info (device vda6): using free space tree Oct 29 05:36:55.354880 kernel: BTRFS info (device vda6): has skinny extents Oct 29 05:36:55.361098 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 05:36:55.362947 systemd[1]: Starting ignition-files.service... Oct 29 05:36:55.383938 ignition[830]: INFO : Ignition 2.14.0 Oct 29 05:36:55.384993 ignition[830]: INFO : Stage: files Oct 29 05:36:55.385642 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:55.385642 ignition[830]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:55.387914 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:55.388843 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Oct 29 05:36:55.390433 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 29 05:36:55.390433 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 29 05:36:55.404787 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 29 05:36:55.405809 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 29 05:36:55.406876 unknown[830]: wrote ssh authorized keys file for user: core Oct 29 05:36:55.407969 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 29 05:36:55.408900 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 29 05:36:55.408900 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Oct 29 05:36:55.579169 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 29 05:36:55.796993 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 29 05:36:55.796993 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 29 05:36:55.799543 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Oct 29 05:36:56.118756 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 29 05:36:56.453297 systemd-networkd[710]: eth0: Gained IPv6LL Oct 29 05:36:57.324889 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Oct 29 05:36:57.328159 ignition[830]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Oct 29 05:36:57.339879 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 29 05:36:57.339879 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 29 05:36:57.339879 ignition[830]: INFO : files: files passed Oct 29 05:36:57.339879 ignition[830]: INFO : Ignition finished successfully Oct 29 05:36:57.353873 kernel: kauditd_printk_skb: 28 callbacks suppressed Oct 29 05:36:57.353910 kernel: audit: type=1130 audit(1761716217.337:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.337285 systemd[1]: Finished ignition-files.service. Oct 29 05:36:57.340783 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 29 05:36:57.349227 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 29 05:36:57.351708 systemd[1]: Starting ignition-quench.service... Oct 29 05:36:57.359385 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 29 05:36:57.370848 kernel: audit: type=1130 audit(1761716217.359:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.370886 kernel: audit: type=1131 audit(1761716217.359:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.357809 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 29 05:36:57.377210 kernel: audit: type=1130 audit(1761716217.370:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.357972 systemd[1]: Finished ignition-quench.service. Oct 29 05:36:57.361008 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 29 05:36:57.371783 systemd[1]: Reached target ignition-complete.target. Oct 29 05:36:57.379172 systemd[1]: Starting initrd-parse-etc.service... Oct 29 05:36:57.399477 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 29 05:36:57.400595 systemd[1]: Finished initrd-parse-etc.service. Oct 29 05:36:57.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.407034 systemd[1]: Reached target initrd-fs.target. Oct 29 05:36:57.413281 kernel: audit: type=1130 audit(1761716217.401:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.413316 kernel: audit: type=1131 audit(1761716217.406:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.412651 systemd[1]: Reached target initrd.target. Oct 29 05:36:57.413896 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 29 05:36:57.415193 systemd[1]: Starting dracut-pre-pivot.service... Oct 29 05:36:57.431999 systemd[1]: Finished dracut-pre-pivot.service. Oct 29 05:36:57.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.434683 systemd[1]: Starting initrd-cleanup.service... Oct 29 05:36:57.439840 kernel: audit: type=1130 audit(1761716217.432:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.448677 systemd[1]: Stopped target nss-lookup.target. Oct 29 05:36:57.450332 systemd[1]: Stopped target remote-cryptsetup.target. Oct 29 05:36:57.451909 systemd[1]: Stopped target timers.target. Oct 29 05:36:57.453395 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 29 05:36:57.454412 systemd[1]: Stopped dracut-pre-pivot.service. Oct 29 05:36:57.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.471011 systemd[1]: Stopped target initrd.target. Oct 29 05:36:57.476017 kernel: audit: type=1131 audit(1761716217.469:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.476256 systemd[1]: Stopped target basic.target. Oct 29 05:36:57.477700 systemd[1]: Stopped target ignition-complete.target. Oct 29 05:36:57.479292 systemd[1]: Stopped target ignition-diskful.target. Oct 29 05:36:57.480835 systemd[1]: Stopped target initrd-root-device.target. Oct 29 05:36:57.482406 systemd[1]: Stopped target remote-fs.target. Oct 29 05:36:57.483943 systemd[1]: Stopped target remote-fs-pre.target. Oct 29 05:36:57.485427 systemd[1]: Stopped target sysinit.target. Oct 29 05:36:57.486913 systemd[1]: Stopped target local-fs.target. Oct 29 05:36:57.488353 systemd[1]: Stopped target local-fs-pre.target. Oct 29 05:36:57.489809 systemd[1]: Stopped target swap.target. Oct 29 05:36:57.491169 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 29 05:36:57.491367 systemd[1]: Stopped dracut-pre-mount.service. Oct 29 05:36:57.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.493701 systemd[1]: Stopped target cryptsetup.target. Oct 29 05:36:57.499917 kernel: audit: type=1131 audit(1761716217.492:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.499331 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 29 05:36:57.506043 kernel: audit: type=1131 audit(1761716217.499:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.499502 systemd[1]: Stopped dracut-initqueue.service. Oct 29 05:36:57.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.500778 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 29 05:36:57.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.501021 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 29 05:36:57.506949 systemd[1]: ignition-files.service: Deactivated successfully. Oct 29 05:36:57.507188 systemd[1]: Stopped ignition-files.service. Oct 29 05:36:57.519372 iscsid[715]: iscsid shutting down. Oct 29 05:36:57.509458 systemd[1]: Stopping ignition-mount.service... Oct 29 05:36:57.525667 ignition[868]: INFO : Ignition 2.14.0 Oct 29 05:36:57.525667 ignition[868]: INFO : Stage: umount Oct 29 05:36:57.525667 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 05:36:57.525667 ignition[868]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 05:36:57.525667 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 05:36:57.525667 ignition[868]: INFO : umount: umount passed Oct 29 05:36:57.525667 ignition[868]: INFO : Ignition finished successfully Oct 29 05:36:57.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.514992 systemd[1]: Stopping iscsid.service... Oct 29 05:36:57.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.517930 systemd[1]: Stopping sysroot-boot.service... Oct 29 05:36:57.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.520376 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 29 05:36:57.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.520667 systemd[1]: Stopped systemd-udev-trigger.service. Oct 29 05:36:57.524800 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 29 05:36:57.524960 systemd[1]: Stopped dracut-pre-trigger.service. Oct 29 05:36:57.530731 systemd[1]: iscsid.service: Deactivated successfully. Oct 29 05:36:57.530892 systemd[1]: Stopped iscsid.service. Oct 29 05:36:57.533480 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 29 05:36:57.533611 systemd[1]: Stopped ignition-mount.service. Oct 29 05:36:57.537415 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 29 05:36:57.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.537542 systemd[1]: Finished initrd-cleanup.service. Oct 29 05:36:57.539646 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 29 05:36:57.539716 systemd[1]: Stopped ignition-disks.service. Oct 29 05:36:57.540369 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 29 05:36:57.540427 systemd[1]: Stopped ignition-kargs.service. Oct 29 05:36:57.541057 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 29 05:36:57.541127 systemd[1]: Stopped ignition-fetch.service. Oct 29 05:36:57.542267 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 29 05:36:57.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.542327 systemd[1]: Stopped ignition-fetch-offline.service. Oct 29 05:36:57.543608 systemd[1]: Stopped target paths.target. Oct 29 05:36:57.544934 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 29 05:36:57.546910 systemd[1]: Stopped systemd-ask-password-console.path. Oct 29 05:36:57.548825 systemd[1]: Stopped target slices.target. Oct 29 05:36:57.550059 systemd[1]: Stopped target sockets.target. Oct 29 05:36:57.551262 systemd[1]: iscsid.socket: Deactivated successfully. Oct 29 05:36:57.551330 systemd[1]: Closed iscsid.socket. Oct 29 05:36:57.552430 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 29 05:36:57.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.552501 systemd[1]: Stopped ignition-setup.service. Oct 29 05:36:57.557136 systemd[1]: Stopping iscsiuio.service... Oct 29 05:36:57.559440 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 29 05:36:57.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.560054 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 29 05:36:57.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.560205 systemd[1]: Stopped iscsiuio.service. Oct 29 05:36:57.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.561521 systemd[1]: Stopped target network.target. Oct 29 05:36:57.562713 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 29 05:36:57.562788 systemd[1]: Closed iscsiuio.socket. Oct 29 05:36:57.564165 systemd[1]: Stopping systemd-networkd.service... Oct 29 05:36:57.567865 systemd-networkd[710]: eth0: DHCPv6 lease lost Oct 29 05:36:57.590000 audit: BPF prog-id=9 op=UNLOAD Oct 29 05:36:57.569824 systemd[1]: Stopping systemd-resolved.service... Oct 29 05:36:57.571423 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 29 05:36:57.571567 systemd[1]: Stopped systemd-networkd.service. Oct 29 05:36:57.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.573467 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 29 05:36:57.598000 audit: BPF prog-id=6 op=UNLOAD Oct 29 05:36:57.573521 systemd[1]: Closed systemd-networkd.socket. Oct 29 05:36:57.575574 systemd[1]: Stopping network-cleanup.service... Oct 29 05:36:57.578356 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 29 05:36:57.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.578433 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 29 05:36:57.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.579728 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 29 05:36:57.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.579934 systemd[1]: Stopped systemd-sysctl.service. Oct 29 05:36:57.581348 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 29 05:36:57.581415 systemd[1]: Stopped systemd-modules-load.service. Oct 29 05:36:57.582462 systemd[1]: Stopping systemd-udevd.service... Oct 29 05:36:57.591551 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 29 05:36:57.592330 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 29 05:36:57.592487 systemd[1]: Stopped systemd-resolved.service. Oct 29 05:36:57.596401 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 29 05:36:57.596577 systemd[1]: Stopped systemd-udevd.service. Oct 29 05:36:57.599559 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 29 05:36:57.599627 systemd[1]: Closed systemd-udevd-control.socket. Oct 29 05:36:57.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.601928 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 29 05:36:57.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.601981 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 29 05:36:57.603552 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 29 05:36:57.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.603619 systemd[1]: Stopped dracut-pre-udev.service. Oct 29 05:36:57.604964 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 29 05:36:57.605029 systemd[1]: Stopped dracut-cmdline.service. Oct 29 05:36:57.606324 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 29 05:36:57.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.606384 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 29 05:36:57.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.608664 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 29 05:36:57.609581 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 29 05:36:57.609655 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 29 05:36:57.620186 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 29 05:36:57.620256 systemd[1]: Stopped kmod-static-nodes.service. Oct 29 05:36:57.621080 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 29 05:36:57.621176 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 29 05:36:57.624650 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 29 05:36:57.625490 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 29 05:36:57.625658 systemd[1]: Stopped network-cleanup.service. Oct 29 05:36:57.627054 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 29 05:36:57.627200 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 29 05:36:57.673240 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 29 05:36:57.673417 systemd[1]: Stopped sysroot-boot.service. Oct 29 05:36:57.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.675004 systemd[1]: Reached target initrd-switch-root.target. Oct 29 05:36:57.676069 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 29 05:36:57.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:57.676153 systemd[1]: Stopped initrd-setup-root.service. Oct 29 05:36:57.678399 systemd[1]: Starting initrd-switch-root.service... Oct 29 05:36:57.694737 systemd[1]: Switching root. Oct 29 05:36:57.716991 systemd-journald[201]: Journal stopped Oct 29 05:37:01.794541 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Oct 29 05:37:01.794721 kernel: SELinux: Class mctp_socket not defined in policy. Oct 29 05:37:01.794783 kernel: SELinux: Class anon_inode not defined in policy. Oct 29 05:37:01.794823 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 29 05:37:01.794850 kernel: SELinux: policy capability network_peer_controls=1 Oct 29 05:37:01.794869 kernel: SELinux: policy capability open_perms=1 Oct 29 05:37:01.794905 kernel: SELinux: policy capability extended_socket_class=1 Oct 29 05:37:01.794938 kernel: SELinux: policy capability always_check_network=0 Oct 29 05:37:01.794972 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 29 05:37:01.794997 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 29 05:37:01.795039 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 29 05:37:01.795067 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 29 05:37:01.795101 systemd[1]: Successfully loaded SELinux policy in 60.038ms. Oct 29 05:37:01.795166 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.374ms. Oct 29 05:37:01.795197 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 05:37:01.795225 systemd[1]: Detected virtualization kvm. Oct 29 05:37:01.795253 systemd[1]: Detected architecture x86-64. Oct 29 05:37:01.795280 systemd[1]: Detected first boot. Oct 29 05:37:01.795317 systemd[1]: Hostname set to . Oct 29 05:37:01.795349 systemd[1]: Initializing machine ID from VM UUID. Oct 29 05:37:01.795381 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 29 05:37:01.795423 systemd[1]: Populated /etc with preset unit settings. Oct 29 05:37:01.795454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 05:37:01.795490 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 05:37:01.795522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 05:37:01.795575 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 29 05:37:01.795603 systemd[1]: Stopped initrd-switch-root.service. Oct 29 05:37:01.795625 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 29 05:37:01.795658 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 29 05:37:01.795685 systemd[1]: Created slice system-addon\x2drun.slice. Oct 29 05:37:01.795716 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 29 05:37:01.795746 systemd[1]: Created slice system-getty.slice. Oct 29 05:37:01.795807 systemd[1]: Created slice system-modprobe.slice. Oct 29 05:37:01.795833 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 29 05:37:01.795862 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 29 05:37:01.795890 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 29 05:37:01.795918 systemd[1]: Created slice user.slice. Oct 29 05:37:01.795952 systemd[1]: Started systemd-ask-password-console.path. Oct 29 05:37:01.795974 systemd[1]: Started systemd-ask-password-wall.path. Oct 29 05:37:01.796001 systemd[1]: Set up automount boot.automount. Oct 29 05:37:01.796045 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 29 05:37:01.796075 systemd[1]: Stopped target initrd-switch-root.target. Oct 29 05:37:01.796097 systemd[1]: Stopped target initrd-fs.target. Oct 29 05:37:01.796125 systemd[1]: Stopped target initrd-root-fs.target. Oct 29 05:37:01.796153 systemd[1]: Reached target integritysetup.target. Oct 29 05:37:01.796190 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 05:37:01.796218 systemd[1]: Reached target remote-fs.target. Oct 29 05:37:01.796240 systemd[1]: Reached target slices.target. Oct 29 05:37:01.796272 systemd[1]: Reached target swap.target. Oct 29 05:37:01.796295 systemd[1]: Reached target torcx.target. Oct 29 05:37:01.796316 systemd[1]: Reached target veritysetup.target. Oct 29 05:37:01.796337 systemd[1]: Listening on systemd-coredump.socket. Oct 29 05:37:01.796358 systemd[1]: Listening on systemd-initctl.socket. Oct 29 05:37:01.796386 systemd[1]: Listening on systemd-networkd.socket. Oct 29 05:37:01.796414 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 05:37:01.796442 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 05:37:01.796464 systemd[1]: Listening on systemd-userdbd.socket. Oct 29 05:37:01.796499 systemd[1]: Mounting dev-hugepages.mount... Oct 29 05:37:01.796527 systemd[1]: Mounting dev-mqueue.mount... Oct 29 05:37:01.796550 systemd[1]: Mounting media.mount... Oct 29 05:37:01.796577 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:01.796599 systemd[1]: Mounting sys-kernel-debug.mount... Oct 29 05:37:01.796630 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 29 05:37:01.796652 systemd[1]: Mounting tmp.mount... Oct 29 05:37:01.796673 systemd[1]: Starting flatcar-tmpfiles.service... Oct 29 05:37:01.796700 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 05:37:01.796747 systemd[1]: Starting kmod-static-nodes.service... Oct 29 05:37:01.796794 systemd[1]: Starting modprobe@configfs.service... Oct 29 05:37:01.796824 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 05:37:01.796847 systemd[1]: Starting modprobe@drm.service... Oct 29 05:37:01.796874 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 05:37:01.796896 systemd[1]: Starting modprobe@fuse.service... Oct 29 05:37:01.796923 systemd[1]: Starting modprobe@loop.service... Oct 29 05:37:01.796946 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 29 05:37:01.796973 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 29 05:37:01.797015 systemd[1]: Stopped systemd-fsck-root.service. Oct 29 05:37:01.797041 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 29 05:37:01.797069 systemd[1]: Stopped systemd-fsck-usr.service. Oct 29 05:37:01.797096 systemd[1]: Stopped systemd-journald.service. Oct 29 05:37:01.797118 systemd[1]: Starting systemd-journald.service... Oct 29 05:37:01.797140 systemd[1]: Starting systemd-modules-load.service... Oct 29 05:37:01.797161 kernel: fuse: init (API version 7.34) Oct 29 05:37:01.797181 systemd[1]: Starting systemd-network-generator.service... Oct 29 05:37:01.797208 systemd[1]: Starting systemd-remount-fs.service... Oct 29 05:37:01.797241 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 05:37:01.797265 systemd[1]: verity-setup.service: Deactivated successfully. Oct 29 05:37:01.797286 systemd[1]: Stopped verity-setup.service. Oct 29 05:37:01.797322 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:01.797344 systemd[1]: Mounted dev-hugepages.mount. Oct 29 05:37:01.797365 systemd[1]: Mounted dev-mqueue.mount. Oct 29 05:37:01.797394 systemd[1]: Mounted media.mount. Oct 29 05:37:01.797416 systemd[1]: Mounted sys-kernel-debug.mount. Oct 29 05:37:01.797440 systemd-journald[976]: Journal started Oct 29 05:37:01.797542 systemd-journald[976]: Runtime Journal (/run/log/journal/a6caab679dcc4d97b1e814dfd9fb809d) is 4.7M, max 38.1M, 33.3M free. Oct 29 05:36:57.891000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 29 05:36:57.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 05:37:01.805826 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 29 05:37:01.805871 systemd[1]: Started systemd-journald.service. Oct 29 05:36:57.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 05:36:57.964000 audit: BPF prog-id=10 op=LOAD Oct 29 05:36:57.964000 audit: BPF prog-id=10 op=UNLOAD Oct 29 05:36:57.964000 audit: BPF prog-id=11 op=LOAD Oct 29 05:36:57.964000 audit: BPF prog-id=11 op=UNLOAD Oct 29 05:36:58.082000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 29 05:36:58.082000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d88c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:36:58.082000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 05:36:58.088000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 29 05:36:58.088000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d965 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:36:58.088000 audit: CWD cwd="/" Oct 29 05:36:58.088000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:36:58.088000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:36:58.088000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 05:37:01.530000 audit: BPF prog-id=12 op=LOAD Oct 29 05:37:01.530000 audit: BPF prog-id=3 op=UNLOAD Oct 29 05:37:01.531000 audit: BPF prog-id=13 op=LOAD Oct 29 05:37:01.531000 audit: BPF prog-id=14 op=LOAD Oct 29 05:37:01.531000 audit: BPF prog-id=4 op=UNLOAD Oct 29 05:37:01.531000 audit: BPF prog-id=5 op=UNLOAD Oct 29 05:37:01.532000 audit: BPF prog-id=15 op=LOAD Oct 29 05:37:01.532000 audit: BPF prog-id=12 op=UNLOAD Oct 29 05:37:01.532000 audit: BPF prog-id=16 op=LOAD Oct 29 05:37:01.532000 audit: BPF prog-id=17 op=LOAD Oct 29 05:37:01.532000 audit: BPF prog-id=13 op=UNLOAD Oct 29 05:37:01.532000 audit: BPF prog-id=14 op=UNLOAD Oct 29 05:37:01.535000 audit: BPF prog-id=18 op=LOAD Oct 29 05:37:01.535000 audit: BPF prog-id=15 op=UNLOAD Oct 29 05:37:01.535000 audit: BPF prog-id=19 op=LOAD Oct 29 05:37:01.535000 audit: BPF prog-id=20 op=LOAD Oct 29 05:37:01.535000 audit: BPF prog-id=16 op=UNLOAD Oct 29 05:37:01.535000 audit: BPF prog-id=17 op=UNLOAD Oct 29 05:37:01.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.545000 audit: BPF prog-id=18 op=UNLOAD Oct 29 05:37:01.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.717000 audit: BPF prog-id=21 op=LOAD Oct 29 05:37:01.718000 audit: BPF prog-id=22 op=LOAD Oct 29 05:37:01.718000 audit: BPF prog-id=23 op=LOAD Oct 29 05:37:01.718000 audit: BPF prog-id=19 op=UNLOAD Oct 29 05:37:01.718000 audit: BPF prog-id=20 op=UNLOAD Oct 29 05:37:01.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.791000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 05:37:01.791000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff735090d0 a2=4000 a3=7fff7350916c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:01.791000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 29 05:37:01.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.528384 systemd[1]: Queued start job for default target multi-user.target. Oct 29 05:36:58.080228 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 05:37:01.528413 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 29 05:36:58.080916 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 05:37:01.536963 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 29 05:36:58.080955 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 05:37:01.805205 systemd[1]: Mounted tmp.mount. Oct 29 05:36:58.081022 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 29 05:37:01.806078 systemd[1]: Finished kmod-static-nodes.service. Oct 29 05:36:58.081041 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 29 05:37:01.807352 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 29 05:36:58.081106 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 29 05:37:01.807559 systemd[1]: Finished modprobe@configfs.service. Oct 29 05:36:58.081129 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 29 05:37:01.810212 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 05:36:58.081449 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 29 05:37:01.813901 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 05:36:58.081523 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 05:37:01.815096 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 05:36:58.081551 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 05:37:01.815309 systemd[1]: Finished modprobe@drm.service. Oct 29 05:36:58.082564 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 29 05:37:01.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.816594 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 05:36:58.082623 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 29 05:37:01.816875 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 05:37:01.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:36:58.082656 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 29 05:36:58.082683 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 29 05:36:58.082714 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 29 05:36:58.082740 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:36:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 29 05:37:00.916379 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 05:37:01.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.818252 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 29 05:37:00.917159 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 05:37:01.818459 systemd[1]: Finished modprobe@fuse.service. Oct 29 05:37:00.917390 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 05:37:01.819659 systemd[1]: Finished systemd-modules-load.service. Oct 29 05:37:00.917759 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 05:37:00.917879 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 29 05:37:00.918036 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T05:37:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 29 05:37:01.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.821366 systemd[1]: Finished systemd-network-generator.service. Oct 29 05:37:01.823348 systemd[1]: Finished systemd-remount-fs.service. Oct 29 05:37:01.825612 systemd[1]: Reached target network-pre.target. Oct 29 05:37:01.829313 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 29 05:37:01.834213 systemd[1]: Mounting sys-kernel-config.mount... Oct 29 05:37:01.839800 kernel: loop: module loaded Oct 29 05:37:01.839222 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 29 05:37:01.842570 systemd[1]: Starting systemd-hwdb-update.service... Oct 29 05:37:01.847970 systemd[1]: Starting systemd-journal-flush.service... Oct 29 05:37:01.848736 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 05:37:01.850492 systemd[1]: Starting systemd-random-seed.service... Oct 29 05:37:01.852977 systemd[1]: Starting systemd-sysctl.service... Oct 29 05:37:01.857441 systemd[1]: Finished flatcar-tmpfiles.service. Oct 29 05:37:01.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.858628 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 05:37:01.858866 systemd[1]: Finished modprobe@loop.service. Oct 29 05:37:01.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.859709 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 29 05:37:01.860982 systemd[1]: Mounted sys-kernel-config.mount. Oct 29 05:37:01.862005 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 05:37:01.866080 systemd[1]: Starting systemd-sysusers.service... Oct 29 05:37:01.871132 systemd-journald[976]: Time spent on flushing to /var/log/journal/a6caab679dcc4d97b1e814dfd9fb809d is 97.081ms for 1299 entries. Oct 29 05:37:01.871132 systemd-journald[976]: System Journal (/var/log/journal/a6caab679dcc4d97b1e814dfd9fb809d) is 8.0M, max 584.8M, 576.8M free. Oct 29 05:37:02.000348 systemd-journald[976]: Received client request to flush runtime journal. Oct 29 05:37:01.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:01.885742 systemd[1]: Finished systemd-random-seed.service. Oct 29 05:37:01.886608 systemd[1]: Reached target first-boot-complete.target. Oct 29 05:37:01.910077 systemd[1]: Finished systemd-sysctl.service. Oct 29 05:37:01.914244 systemd[1]: Finished systemd-sysusers.service. Oct 29 05:37:01.916934 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 05:37:01.982014 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 05:37:02.001999 systemd[1]: Finished systemd-journal-flush.service. Oct 29 05:37:02.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.057391 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 05:37:02.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.059997 systemd[1]: Starting systemd-udev-settle.service... Oct 29 05:37:02.074993 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 29 05:37:02.503755 systemd[1]: Finished systemd-hwdb-update.service. Oct 29 05:37:02.511783 kernel: kauditd_printk_skb: 108 callbacks suppressed Oct 29 05:37:02.511877 kernel: audit: type=1130 audit(1761716222.503:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.505000 audit: BPF prog-id=24 op=LOAD Oct 29 05:37:02.512676 systemd[1]: Starting systemd-udevd.service... Oct 29 05:37:02.511000 audit: BPF prog-id=25 op=LOAD Oct 29 05:37:02.511000 audit: BPF prog-id=7 op=UNLOAD Oct 29 05:37:02.511000 audit: BPF prog-id=8 op=UNLOAD Oct 29 05:37:02.516326 kernel: audit: type=1334 audit(1761716222.505:149): prog-id=24 op=LOAD Oct 29 05:37:02.516392 kernel: audit: type=1334 audit(1761716222.511:150): prog-id=25 op=LOAD Oct 29 05:37:02.516443 kernel: audit: type=1334 audit(1761716222.511:151): prog-id=7 op=UNLOAD Oct 29 05:37:02.516487 kernel: audit: type=1334 audit(1761716222.511:152): prog-id=8 op=UNLOAD Oct 29 05:37:02.544083 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Oct 29 05:37:02.577438 systemd[1]: Started systemd-udevd.service. Oct 29 05:37:02.588803 kernel: audit: type=1130 audit(1761716222.577:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.595298 kernel: audit: type=1334 audit(1761716222.587:154): prog-id=26 op=LOAD Oct 29 05:37:02.587000 audit: BPF prog-id=26 op=LOAD Oct 29 05:37:02.590882 systemd[1]: Starting systemd-networkd.service... Oct 29 05:37:02.612521 kernel: audit: type=1334 audit(1761716222.603:155): prog-id=27 op=LOAD Oct 29 05:37:02.612609 kernel: audit: type=1334 audit(1761716222.603:156): prog-id=28 op=LOAD Oct 29 05:37:02.612668 kernel: audit: type=1334 audit(1761716222.603:157): prog-id=29 op=LOAD Oct 29 05:37:02.603000 audit: BPF prog-id=27 op=LOAD Oct 29 05:37:02.603000 audit: BPF prog-id=28 op=LOAD Oct 29 05:37:02.603000 audit: BPF prog-id=29 op=LOAD Oct 29 05:37:02.605546 systemd[1]: Starting systemd-userdbd.service... Oct 29 05:37:02.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.666281 systemd[1]: Started systemd-userdbd.service. Oct 29 05:37:02.672961 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 29 05:37:02.769827 kernel: mousedev: PS/2 mouse device common for all mice Oct 29 05:37:02.792829 systemd-networkd[1026]: lo: Link UP Oct 29 05:37:02.795352 systemd-networkd[1026]: lo: Gained carrier Oct 29 05:37:02.796335 systemd-networkd[1026]: Enumeration completed Oct 29 05:37:02.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:02.797352 systemd[1]: Started systemd-networkd.service. Oct 29 05:37:02.801037 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 05:37:02.804034 systemd-networkd[1026]: eth0: Link UP Oct 29 05:37:02.804176 systemd-networkd[1026]: eth0: Gained carrier Oct 29 05:37:02.822017 systemd-networkd[1026]: eth0: DHCPv4 address 10.244.11.46/30, gateway 10.244.11.45 acquired from 10.244.11.45 Oct 29 05:37:02.837112 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 05:37:02.842841 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Oct 29 05:37:02.854795 kernel: ACPI: button: Power Button [PWRF] Oct 29 05:37:02.864000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 29 05:37:02.864000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5559e21602c0 a1=338ec a2=7f7025cd4bc5 a3=5 items=110 ppid=1013 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:02.864000 audit: CWD cwd="/" Oct 29 05:37:02.864000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=1 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=2 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=3 name=(null) inode=14763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=4 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=5 name=(null) inode=14764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=6 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=7 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=8 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=9 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=10 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=11 name=(null) inode=14767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=12 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=13 name=(null) inode=14768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=14 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=15 name=(null) inode=14769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=16 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=17 name=(null) inode=14770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=18 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=19 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=20 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=21 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=22 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=23 name=(null) inode=14773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=24 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=25 name=(null) inode=14774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=26 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=27 name=(null) inode=14775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=28 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=29 name=(null) inode=14776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=30 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=31 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=32 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=33 name=(null) inode=14778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=34 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=35 name=(null) inode=14779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=36 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=37 name=(null) inode=14780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=38 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=39 name=(null) inode=14781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=40 name=(null) inode=14777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=41 name=(null) inode=14782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=42 name=(null) inode=14762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=43 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=44 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=45 name=(null) inode=14784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=46 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=47 name=(null) inode=14785 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=48 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=49 name=(null) inode=14786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=50 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=51 name=(null) inode=14787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=52 name=(null) inode=14783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=53 name=(null) inode=14788 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=55 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=56 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=57 name=(null) inode=14790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=58 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=59 name=(null) inode=14791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=60 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=61 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=62 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=63 name=(null) inode=14793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=64 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=65 name=(null) inode=14794 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=66 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=67 name=(null) inode=14795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=68 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=69 name=(null) inode=14796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=70 name=(null) inode=14792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=71 name=(null) inode=14797 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=72 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=73 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=74 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=75 name=(null) inode=14799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=76 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=77 name=(null) inode=14800 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=78 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=79 name=(null) inode=14801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=80 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=81 name=(null) inode=14802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=82 name=(null) inode=14798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=83 name=(null) inode=14803 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=84 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=85 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=86 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=87 name=(null) inode=14805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=88 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=89 name=(null) inode=14806 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=90 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=91 name=(null) inode=14807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=92 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=93 name=(null) inode=14808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=94 name=(null) inode=14804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=95 name=(null) inode=14809 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=96 name=(null) inode=14789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=97 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=98 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=99 name=(null) inode=14811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=100 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=101 name=(null) inode=14812 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=102 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=103 name=(null) inode=14813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=104 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=105 name=(null) inode=14814 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=106 name=(null) inode=14810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=107 name=(null) inode=14815 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PATH item=109 name=(null) inode=14816 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:37:02.864000 audit: PROCTITLE proctitle="(udev-worker)" Oct 29 05:37:02.925827 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 29 05:37:02.939159 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 29 05:37:02.939425 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 29 05:37:02.939644 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Oct 29 05:37:03.087500 systemd[1]: Finished systemd-udev-settle.service. Oct 29 05:37:03.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.090196 systemd[1]: Starting lvm2-activation-early.service... Oct 29 05:37:03.114707 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 05:37:03.148425 systemd[1]: Finished lvm2-activation-early.service. Oct 29 05:37:03.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.149353 systemd[1]: Reached target cryptsetup.target. Oct 29 05:37:03.151812 systemd[1]: Starting lvm2-activation.service... Oct 29 05:37:03.157344 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 05:37:03.184223 systemd[1]: Finished lvm2-activation.service. Oct 29 05:37:03.185120 systemd[1]: Reached target local-fs-pre.target. Oct 29 05:37:03.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.185792 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 29 05:37:03.185840 systemd[1]: Reached target local-fs.target. Oct 29 05:37:03.186447 systemd[1]: Reached target machines.target. Oct 29 05:37:03.188940 systemd[1]: Starting ldconfig.service... Oct 29 05:37:03.190413 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 05:37:03.190474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:03.193390 systemd[1]: Starting systemd-boot-update.service... Oct 29 05:37:03.196313 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 29 05:37:03.205931 systemd[1]: Starting systemd-machine-id-commit.service... Oct 29 05:37:03.209782 systemd[1]: Starting systemd-sysext.service... Oct 29 05:37:03.221485 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Oct 29 05:37:03.223903 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 29 05:37:03.229861 systemd[1]: Unmounting usr-share-oem.mount... Oct 29 05:37:03.235883 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 29 05:37:03.236232 systemd[1]: Unmounted usr-share-oem.mount. Oct 29 05:37:03.273939 kernel: loop0: detected capacity change from 0 to 229808 Oct 29 05:37:03.393025 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 29 05:37:03.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.418823 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 29 05:37:03.419649 systemd[1]: Finished systemd-machine-id-commit.service. Oct 29 05:37:03.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.438815 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 29 05:37:03.460804 kernel: loop1: detected capacity change from 0 to 229808 Oct 29 05:37:03.475252 (sd-sysext)[1058]: Using extensions 'kubernetes'. Oct 29 05:37:03.478677 (sd-sysext)[1058]: Merged extensions into '/usr'. Oct 29 05:37:03.512030 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:03.514710 systemd[1]: Mounting usr-share-oem.mount... Oct 29 05:37:03.515538 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Oct 29 05:37:03.515538 systemd-fsck[1055]: /dev/vda1: 790 files, 120772/258078 clusters Oct 29 05:37:03.515691 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 05:37:03.521443 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 05:37:03.525427 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 05:37:03.529370 systemd[1]: Starting modprobe@loop.service... Oct 29 05:37:03.530474 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 05:37:03.530910 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:03.531162 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:03.534057 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 29 05:37:03.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.536058 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 05:37:03.537037 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 05:37:03.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.541503 systemd[1]: Mounted usr-share-oem.mount. Oct 29 05:37:03.543359 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 05:37:03.543744 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 05:37:03.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.545115 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 05:37:03.545306 systemd[1]: Finished modprobe@loop.service. Oct 29 05:37:03.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.550155 systemd[1]: Finished systemd-sysext.service. Oct 29 05:37:03.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:03.553989 systemd[1]: Mounting boot.mount... Oct 29 05:37:03.556078 systemd[1]: Starting ensure-sysext.service... Oct 29 05:37:03.560862 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 05:37:03.560953 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 05:37:03.563003 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 29 05:37:03.570528 systemd[1]: Reloading. Oct 29 05:37:03.591008 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 29 05:37:03.597080 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 29 05:37:03.601652 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 29 05:37:03.725207 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-10-29T05:37:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 05:37:03.725274 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-10-29T05:37:03Z" level=info msg="torcx already run" Oct 29 05:37:03.830147 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 29 05:37:03.866129 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 05:37:03.866170 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 05:37:03.894803 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 05:37:03.982000 audit: BPF prog-id=30 op=LOAD Oct 29 05:37:03.982000 audit: BPF prog-id=31 op=LOAD Oct 29 05:37:03.983000 audit: BPF prog-id=24 op=UNLOAD Oct 29 05:37:03.983000 audit: BPF prog-id=25 op=UNLOAD Oct 29 05:37:03.984000 audit: BPF prog-id=32 op=LOAD Oct 29 05:37:03.984000 audit: BPF prog-id=21 op=UNLOAD Oct 29 05:37:03.984000 audit: BPF prog-id=33 op=LOAD Oct 29 05:37:03.984000 audit: BPF prog-id=34 op=LOAD Oct 29 05:37:03.984000 audit: BPF prog-id=22 op=UNLOAD Oct 29 05:37:03.984000 audit: BPF prog-id=23 op=UNLOAD Oct 29 05:37:03.985000 audit: BPF prog-id=35 op=LOAD Oct 29 05:37:03.985000 audit: BPF prog-id=26 op=UNLOAD Oct 29 05:37:03.987000 audit: BPF prog-id=36 op=LOAD Oct 29 05:37:03.987000 audit: BPF prog-id=27 op=UNLOAD Oct 29 05:37:03.988000 audit: BPF prog-id=37 op=LOAD Oct 29 05:37:03.988000 audit: BPF prog-id=38 op=LOAD Oct 29 05:37:03.988000 audit: BPF prog-id=28 op=UNLOAD Oct 29 05:37:03.988000 audit: BPF prog-id=29 op=UNLOAD Oct 29 05:37:04.002492 systemd[1]: Finished ldconfig.service. Oct 29 05:37:04.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.007469 systemd[1]: Mounted boot.mount. Oct 29 05:37:04.027069 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.029058 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 05:37:04.032423 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 05:37:04.036347 systemd[1]: Starting modprobe@loop.service... Oct 29 05:37:04.037091 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.037254 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:04.038648 systemd[1]: Finished systemd-boot-update.service. Oct 29 05:37:04.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.039989 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 05:37:04.040180 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 05:37:04.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.041411 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 05:37:04.041585 systemd[1]: Finished modprobe@loop.service. Oct 29 05:37:04.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.043536 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 05:37:04.043725 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 05:37:04.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.047021 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.049001 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 05:37:04.052575 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 05:37:04.056596 systemd[1]: Starting modprobe@loop.service... Oct 29 05:37:04.058253 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.058428 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:04.060383 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 05:37:04.060605 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 05:37:04.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.061917 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 05:37:04.062137 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 05:37:04.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.063382 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 05:37:04.063573 systemd[1]: Finished modprobe@loop.service. Oct 29 05:37:04.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.068246 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.070010 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 05:37:04.073680 systemd[1]: Starting modprobe@drm.service... Oct 29 05:37:04.077854 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 05:37:04.080053 systemd[1]: Starting modprobe@loop.service... Oct 29 05:37:04.080884 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.081136 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:04.084414 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 29 05:37:04.087962 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 05:37:04.088198 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 05:37:04.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.089467 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 05:37:04.089656 systemd[1]: Finished modprobe@drm.service. Oct 29 05:37:04.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.090960 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 05:37:04.091156 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 05:37:04.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.092482 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 05:37:04.092690 systemd[1]: Finished modprobe@loop.service. Oct 29 05:37:04.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.094351 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 05:37:04.094481 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.095905 systemd[1]: Finished ensure-sysext.service. Oct 29 05:37:04.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.196129 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 29 05:37:04.197325 systemd-networkd[1026]: eth0: Gained IPv6LL Oct 29 05:37:04.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.200046 systemd[1]: Starting audit-rules.service... Oct 29 05:37:04.202425 systemd[1]: Starting clean-ca-certificates.service... Oct 29 05:37:04.205471 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 29 05:37:04.207000 audit: BPF prog-id=39 op=LOAD Oct 29 05:37:04.212064 systemd[1]: Starting systemd-resolved.service... Oct 29 05:37:04.214000 audit: BPF prog-id=40 op=LOAD Oct 29 05:37:04.216238 systemd[1]: Starting systemd-timesyncd.service... Oct 29 05:37:04.219826 systemd[1]: Starting systemd-update-utmp.service... Oct 29 05:37:04.223779 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 29 05:37:04.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.233475 systemd[1]: Finished clean-ca-certificates.service. Oct 29 05:37:04.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.234339 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 05:37:04.234588 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:04.234635 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 05:37:04.241000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.244396 systemd[1]: Finished systemd-update-utmp.service. Oct 29 05:37:04.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.270415 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 29 05:37:04.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.273075 systemd[1]: Starting systemd-update-done.service... Oct 29 05:37:04.283445 systemd[1]: Finished systemd-update-done.service. Oct 29 05:37:04.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:04.291000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 29 05:37:04.291000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0ee5b190 a2=420 a3=0 items=0 ppid=1144 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:04.291000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 29 05:37:04.292423 augenrules[1165]: No rules Oct 29 05:37:04.294336 systemd[1]: Finished audit-rules.service. Oct 29 05:37:04.334755 systemd-resolved[1148]: Positive Trust Anchors: Oct 29 05:37:04.334791 systemd-resolved[1148]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 05:37:04.334830 systemd-resolved[1148]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 05:37:04.336365 systemd[1]: Started systemd-timesyncd.service. Oct 29 05:37:04.337225 systemd[1]: Reached target time-set.target. Oct 29 05:37:04.344989 systemd-resolved[1148]: Using system hostname 'srv-gd80c.gb1.brightbox.com'. Oct 29 05:37:04.348723 systemd[1]: Started systemd-resolved.service. Oct 29 05:37:04.349660 systemd[1]: Reached target network.target. Oct 29 05:37:04.350292 systemd[1]: Reached target network-online.target. Oct 29 05:37:04.350938 systemd[1]: Reached target nss-lookup.target. Oct 29 05:37:04.351561 systemd[1]: Reached target sysinit.target. Oct 29 05:37:04.352295 systemd[1]: Started motdgen.path. Oct 29 05:37:04.352930 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 29 05:37:04.354372 systemd[1]: Started logrotate.timer. Oct 29 05:37:04.355162 systemd[1]: Started mdadm.timer. Oct 29 05:37:04.355734 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 29 05:37:04.356395 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 29 05:37:04.356439 systemd[1]: Reached target paths.target. Oct 29 05:37:04.357045 systemd[1]: Reached target timers.target. Oct 29 05:37:04.358110 systemd[1]: Listening on dbus.socket. Oct 29 05:37:04.360594 systemd[1]: Starting docker.socket... Oct 29 05:37:04.364913 systemd[1]: Listening on sshd.socket. Oct 29 05:37:04.379323 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:04.380202 systemd[1]: Listening on docker.socket. Oct 29 05:37:04.380989 systemd[1]: Reached target sockets.target. Oct 29 05:37:04.381596 systemd[1]: Reached target basic.target. Oct 29 05:37:04.382250 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.382304 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 05:37:04.384199 systemd[1]: Starting containerd.service... Oct 29 05:37:04.387407 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 29 05:37:04.390837 systemd[1]: Starting dbus.service... Oct 29 05:37:04.393368 systemd[1]: Starting enable-oem-cloudinit.service... Oct 29 05:37:04.396236 systemd[1]: Starting extend-filesystems.service... Oct 29 05:37:04.398490 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 29 05:37:04.403267 systemd[1]: Starting kubelet.service... Oct 29 05:37:04.413353 jq[1178]: false Oct 29 05:37:04.410088 systemd[1]: Starting motdgen.service... Oct 29 05:37:04.415172 systemd[1]: Starting prepare-helm.service... Oct 29 05:37:04.417524 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 29 05:37:04.421130 systemd[1]: Starting sshd-keygen.service... Oct 29 05:37:04.427477 systemd[1]: Starting systemd-logind.service... Oct 29 05:37:04.428480 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 05:37:04.428660 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 29 05:37:04.430227 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 29 05:37:04.433475 systemd[1]: Starting update-engine.service... Oct 29 05:37:04.436498 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 29 05:37:04.441398 jq[1191]: true Oct 29 05:37:04.443862 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 29 05:37:04.444194 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 29 05:37:04.450252 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 29 05:37:04.450584 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 29 05:37:04.476066 jq[1195]: true Oct 29 05:37:04.482228 tar[1194]: linux-amd64/LICENSE Oct 29 05:37:04.484590 tar[1194]: linux-amd64/helm Oct 29 05:37:04.521326 dbus-daemon[1175]: [system] SELinux support is enabled Oct 29 05:37:05.158008 systemd-timesyncd[1151]: Contacted time server 178.79.158.157:123 (3.flatcar.pool.ntp.org). Oct 29 05:37:05.158198 systemd-timesyncd[1151]: Initial clock synchronization to Wed 2025-10-29 05:37:05.157501 UTC. Oct 29 05:37:05.158266 systemd-resolved[1148]: Clock change detected. Flushing caches. Oct 29 05:37:05.158823 systemd[1]: Started dbus.service. Oct 29 05:37:05.162278 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 29 05:37:05.162333 systemd[1]: Reached target system-config.target. Oct 29 05:37:05.163019 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 29 05:37:05.163053 systemd[1]: Reached target user-config.target. Oct 29 05:37:05.163843 extend-filesystems[1179]: Found loop1 Oct 29 05:37:05.166247 extend-filesystems[1179]: Found vda Oct 29 05:37:05.167181 extend-filesystems[1179]: Found vda1 Oct 29 05:37:05.168053 extend-filesystems[1179]: Found vda2 Oct 29 05:37:05.169009 extend-filesystems[1179]: Found vda3 Oct 29 05:37:05.170052 dbus-daemon[1175]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1026 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 29 05:37:05.170294 extend-filesystems[1179]: Found usr Oct 29 05:37:05.172963 extend-filesystems[1179]: Found vda4 Oct 29 05:37:05.172963 extend-filesystems[1179]: Found vda6 Oct 29 05:37:05.172963 extend-filesystems[1179]: Found vda7 Oct 29 05:37:05.172963 extend-filesystems[1179]: Found vda9 Oct 29 05:37:05.172963 extend-filesystems[1179]: Checking size of /dev/vda9 Oct 29 05:37:05.185452 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 29 05:37:05.190589 systemd[1]: Starting systemd-hostnamed.service... Oct 29 05:37:05.191931 systemd[1]: motdgen.service: Deactivated successfully. Oct 29 05:37:05.192225 systemd[1]: Finished motdgen.service. Oct 29 05:37:05.239363 extend-filesystems[1179]: Resized partition /dev/vda9 Oct 29 05:37:05.267514 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Oct 29 05:37:05.268835 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 29 05:37:05.273822 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) Oct 29 05:37:05.277858 update_engine[1190]: I1029 05:37:05.275985 1190 main.cc:92] Flatcar Update Engine starting Oct 29 05:37:05.280189 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 29 05:37:05.284616 systemd[1]: Started update-engine.service. Oct 29 05:37:05.288122 systemd[1]: Started locksmithd.service. Oct 29 05:37:05.290007 update_engine[1190]: I1029 05:37:05.289959 1190 update_check_scheduler.cc:74] Next update check in 11m6s Oct 29 05:37:05.364787 env[1199]: time="2025-10-29T05:37:05.364667188Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 29 05:37:05.412581 systemd-logind[1187]: Watching system buttons on /dev/input/event2 (Power Button) Oct 29 05:37:05.412630 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 29 05:37:05.414555 systemd-logind[1187]: New seat seat0. Oct 29 05:37:05.421366 systemd[1]: Started systemd-logind.service. Oct 29 05:37:05.462951 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 29 05:37:05.478994 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 29 05:37:05.478994 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 29 05:37:05.478994 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 29 05:37:05.486251 extend-filesystems[1179]: Resized filesystem in /dev/vda9 Oct 29 05:37:05.481085 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 29 05:37:05.481451 systemd[1]: Finished extend-filesystems.service. Oct 29 05:37:05.500590 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 29 05:37:05.501349 systemd[1]: Started systemd-hostnamed.service. Oct 29 05:37:05.504700 env[1199]: time="2025-10-29T05:37:05.504587937Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 29 05:37:05.504929 env[1199]: time="2025-10-29T05:37:05.504880762Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.507015 dbus-daemon[1175]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1221 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 29 05:37:05.507420 env[1199]: time="2025-10-29T05:37:05.507376615Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 29 05:37:05.507595 env[1199]: time="2025-10-29T05:37:05.507564246Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.509305 env[1199]: time="2025-10-29T05:37:05.509268672Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 05:37:05.510820 systemd[1]: Starting polkit.service... Oct 29 05:37:05.517670 env[1199]: time="2025-10-29T05:37:05.516956738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.517670 env[1199]: time="2025-10-29T05:37:05.517011611Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 29 05:37:05.517670 env[1199]: time="2025-10-29T05:37:05.517034254Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.517670 env[1199]: time="2025-10-29T05:37:05.517217971Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.517898 env[1199]: time="2025-10-29T05:37:05.517681232Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 29 05:37:05.517979 env[1199]: time="2025-10-29T05:37:05.517887965Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 05:37:05.517979 env[1199]: time="2025-10-29T05:37:05.517958448Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 29 05:37:05.518430 env[1199]: time="2025-10-29T05:37:05.518050663Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 29 05:37:05.518430 env[1199]: time="2025-10-29T05:37:05.518078757Z" level=info msg="metadata content store policy set" policy=shared Oct 29 05:37:05.524732 env[1199]: time="2025-10-29T05:37:05.524396782Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 29 05:37:05.524732 env[1199]: time="2025-10-29T05:37:05.524458079Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 29 05:37:05.524732 env[1199]: time="2025-10-29T05:37:05.524485234Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 29 05:37:05.524732 env[1199]: time="2025-10-29T05:37:05.524680789Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.524732 env[1199]: time="2025-10-29T05:37:05.524727222Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524751133Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524774070Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524815564Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524837745Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524858196Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525011 env[1199]: time="2025-10-29T05:37:05.524904916Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.525308 env[1199]: time="2025-10-29T05:37:05.524990366Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 29 05:37:05.525308 env[1199]: time="2025-10-29T05:37:05.525218244Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 29 05:37:05.525475 env[1199]: time="2025-10-29T05:37:05.525418495Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 29 05:37:05.525987 env[1199]: time="2025-10-29T05:37:05.525954586Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 29 05:37:05.526070 env[1199]: time="2025-10-29T05:37:05.526030455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.526070 env[1199]: time="2025-10-29T05:37:05.526057112Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526194877Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526226817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526340453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526371865Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526415744Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526488745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526513812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526533094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526574565Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526860894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526904733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526955930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.526976050Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 29 05:37:05.527102 env[1199]: time="2025-10-29T05:37:05.527015118Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 29 05:37:05.527754 env[1199]: time="2025-10-29T05:37:05.527036008Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 29 05:37:05.527754 env[1199]: time="2025-10-29T05:37:05.527114732Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 29 05:37:05.527754 env[1199]: time="2025-10-29T05:37:05.527214723Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 29 05:37:05.527936 env[1199]: time="2025-10-29T05:37:05.527553883Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 29 05:37:05.527936 env[1199]: time="2025-10-29T05:37:05.527680259Z" level=info msg="Connect containerd service" Oct 29 05:37:05.527936 env[1199]: time="2025-10-29T05:37:05.527771163Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 29 05:37:05.531594 env[1199]: time="2025-10-29T05:37:05.529422279Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 05:37:05.531594 env[1199]: time="2025-10-29T05:37:05.530499112Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 29 05:37:05.531594 env[1199]: time="2025-10-29T05:37:05.530959668Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 29 05:37:05.531232 systemd[1]: Started containerd.service. Oct 29 05:37:05.533948 env[1199]: time="2025-10-29T05:37:05.532521964Z" level=info msg="containerd successfully booted in 0.180815s" Oct 29 05:37:05.534791 env[1199]: time="2025-10-29T05:37:05.534728443Z" level=info msg="Start subscribing containerd event" Oct 29 05:37:05.534926 env[1199]: time="2025-10-29T05:37:05.534828504Z" level=info msg="Start recovering state" Oct 29 05:37:05.536105 env[1199]: time="2025-10-29T05:37:05.535281019Z" level=info msg="Start event monitor" Oct 29 05:37:05.536105 env[1199]: time="2025-10-29T05:37:05.535316203Z" level=info msg="Start snapshots syncer" Oct 29 05:37:05.536105 env[1199]: time="2025-10-29T05:37:05.535352381Z" level=info msg="Start cni network conf syncer for default" Oct 29 05:37:05.536105 env[1199]: time="2025-10-29T05:37:05.535366998Z" level=info msg="Start streaming server" Oct 29 05:37:05.549982 polkitd[1237]: Started polkitd version 121 Oct 29 05:37:05.586999 polkitd[1237]: Loading rules from directory /etc/polkit-1/rules.d Oct 29 05:37:05.587133 polkitd[1237]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 29 05:37:05.589949 polkitd[1237]: Finished loading, compiling and executing 2 rules Oct 29 05:37:05.590525 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 29 05:37:05.590766 systemd[1]: Started polkit.service. Oct 29 05:37:05.591800 polkitd[1237]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 29 05:37:05.613147 systemd-hostnamed[1221]: Hostname set to (static) Oct 29 05:37:05.626071 systemd-networkd[1026]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:2cb:24:19ff:fef4:b2e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:2cb:24:19ff:fef4:b2e/64 assigned by NDisc. Oct 29 05:37:05.626085 systemd-networkd[1026]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 29 05:37:06.258931 tar[1194]: linux-amd64/README.md Oct 29 05:37:06.267369 systemd[1]: Finished prepare-helm.service. Oct 29 05:37:06.331699 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 29 05:37:06.663137 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 29 05:37:06.691151 systemd[1]: Finished sshd-keygen.service. Oct 29 05:37:06.694770 systemd[1]: Starting issuegen.service... Oct 29 05:37:06.702063 systemd[1]: issuegen.service: Deactivated successfully. Oct 29 05:37:06.702334 systemd[1]: Finished issuegen.service. Oct 29 05:37:06.705391 systemd[1]: Starting systemd-user-sessions.service... Oct 29 05:37:06.716215 systemd[1]: Finished systemd-user-sessions.service. Oct 29 05:37:06.722523 systemd[1]: Started getty@tty1.service. Oct 29 05:37:06.725441 systemd[1]: Started serial-getty@ttyS0.service. Oct 29 05:37:06.726620 systemd[1]: Reached target getty.target. Oct 29 05:37:06.860628 systemd[1]: Started kubelet.service. Oct 29 05:37:07.599546 kubelet[1268]: E1029 05:37:07.599434 1268 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 05:37:07.602381 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 05:37:07.602636 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 05:37:07.603274 systemd[1]: kubelet.service: Consumed 1.156s CPU time. Oct 29 05:37:12.211477 coreos-metadata[1174]: Oct 29 05:37:12.211 WARN failed to locate config-drive, using the metadata service API instead Oct 29 05:37:12.276533 coreos-metadata[1174]: Oct 29 05:37:12.276 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 29 05:37:12.300487 coreos-metadata[1174]: Oct 29 05:37:12.300 INFO Fetch successful Oct 29 05:37:12.300808 coreos-metadata[1174]: Oct 29 05:37:12.300 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 29 05:37:12.328175 coreos-metadata[1174]: Oct 29 05:37:12.327 INFO Fetch successful Oct 29 05:37:12.329795 unknown[1174]: wrote ssh authorized keys file for user: core Oct 29 05:37:12.341596 update-ssh-keys[1277]: Updated "/home/core/.ssh/authorized_keys" Oct 29 05:37:12.342706 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 29 05:37:12.343396 systemd[1]: Reached target multi-user.target. Oct 29 05:37:12.345496 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 29 05:37:12.356296 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 29 05:37:12.356539 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 29 05:37:12.356762 systemd[1]: Startup finished in 1.159s (kernel) + 6.129s (initrd) + 13.902s (userspace) = 21.190s. Oct 29 05:37:15.193850 systemd[1]: Created slice system-sshd.slice. Oct 29 05:37:15.196341 systemd[1]: Started sshd@0-10.244.11.46:22-147.75.109.163:57814.service. Oct 29 05:37:16.125277 sshd[1280]: Accepted publickey for core from 147.75.109.163 port 57814 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:16.129205 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:16.146205 systemd[1]: Created slice user-500.slice. Oct 29 05:37:16.148361 systemd[1]: Starting user-runtime-dir@500.service... Oct 29 05:37:16.155067 systemd-logind[1187]: New session 1 of user core. Oct 29 05:37:16.166286 systemd[1]: Finished user-runtime-dir@500.service. Oct 29 05:37:16.171487 systemd[1]: Starting user@500.service... Oct 29 05:37:16.177293 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:16.301643 systemd[1283]: Queued start job for default target default.target. Oct 29 05:37:16.303042 systemd[1283]: Reached target paths.target. Oct 29 05:37:16.303261 systemd[1283]: Reached target sockets.target. Oct 29 05:37:16.303472 systemd[1283]: Reached target timers.target. Oct 29 05:37:16.303708 systemd[1283]: Reached target basic.target. Oct 29 05:37:16.303994 systemd[1283]: Reached target default.target. Oct 29 05:37:16.304047 systemd[1]: Started user@500.service. Oct 29 05:37:16.304493 systemd[1283]: Startup finished in 117ms. Oct 29 05:37:16.306131 systemd[1]: Started session-1.scope. Oct 29 05:37:16.940001 systemd[1]: Started sshd@1-10.244.11.46:22-147.75.109.163:57822.service. Oct 29 05:37:17.687178 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 29 05:37:17.687603 systemd[1]: Stopped kubelet.service. Oct 29 05:37:17.687673 systemd[1]: kubelet.service: Consumed 1.156s CPU time. Oct 29 05:37:17.689837 systemd[1]: Starting kubelet.service... Oct 29 05:37:17.844275 sshd[1292]: Accepted publickey for core from 147.75.109.163 port 57822 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:17.847043 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:17.854246 systemd-logind[1187]: New session 2 of user core. Oct 29 05:37:17.855117 systemd[1]: Started session-2.scope. Oct 29 05:37:17.888536 systemd[1]: Started kubelet.service. Oct 29 05:37:17.996201 kubelet[1299]: E1029 05:37:17.995964 1299 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 05:37:18.000303 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 05:37:18.000537 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 05:37:18.470476 sshd[1292]: pam_unix(sshd:session): session closed for user core Oct 29 05:37:18.474295 systemd[1]: sshd@1-10.244.11.46:22-147.75.109.163:57822.service: Deactivated successfully. Oct 29 05:37:18.475382 systemd[1]: session-2.scope: Deactivated successfully. Oct 29 05:37:18.476303 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. Oct 29 05:37:18.477679 systemd-logind[1187]: Removed session 2. Oct 29 05:37:18.620085 systemd[1]: Started sshd@2-10.244.11.46:22-147.75.109.163:57824.service. Oct 29 05:37:19.529347 sshd[1308]: Accepted publickey for core from 147.75.109.163 port 57824 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:19.531930 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:19.538593 systemd-logind[1187]: New session 3 of user core. Oct 29 05:37:19.539362 systemd[1]: Started session-3.scope. Oct 29 05:37:20.155874 sshd[1308]: pam_unix(sshd:session): session closed for user core Oct 29 05:37:20.159396 systemd[1]: sshd@2-10.244.11.46:22-147.75.109.163:57824.service: Deactivated successfully. Oct 29 05:37:20.160336 systemd[1]: session-3.scope: Deactivated successfully. Oct 29 05:37:20.161201 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. Oct 29 05:37:20.162886 systemd-logind[1187]: Removed session 3. Oct 29 05:37:20.305641 systemd[1]: Started sshd@3-10.244.11.46:22-147.75.109.163:60010.service. Oct 29 05:37:21.210054 sshd[1314]: Accepted publickey for core from 147.75.109.163 port 60010 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:21.212050 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:21.219651 systemd[1]: Started session-4.scope. Oct 29 05:37:21.220328 systemd-logind[1187]: New session 4 of user core. Oct 29 05:37:21.838398 sshd[1314]: pam_unix(sshd:session): session closed for user core Oct 29 05:37:21.842040 systemd[1]: sshd@3-10.244.11.46:22-147.75.109.163:60010.service: Deactivated successfully. Oct 29 05:37:21.843012 systemd[1]: session-4.scope: Deactivated successfully. Oct 29 05:37:21.843775 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. Oct 29 05:37:21.845083 systemd-logind[1187]: Removed session 4. Oct 29 05:37:21.986885 systemd[1]: Started sshd@4-10.244.11.46:22-147.75.109.163:60020.service. Oct 29 05:37:22.884376 sshd[1320]: Accepted publickey for core from 147.75.109.163 port 60020 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:22.887068 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:22.894710 systemd[1]: Started session-5.scope. Oct 29 05:37:22.895183 systemd-logind[1187]: New session 5 of user core. Oct 29 05:37:23.383855 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 29 05:37:23.385031 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 05:37:23.399349 dbus-daemon[1175]: \xd0\xfd6\xeb\u001fV: received setenforce notice (enforcing=894988448) Oct 29 05:37:23.402969 sudo[1323]: pam_unix(sudo:session): session closed for user root Oct 29 05:37:23.549969 sshd[1320]: pam_unix(sshd:session): session closed for user core Oct 29 05:37:23.555024 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. Oct 29 05:37:23.555926 systemd[1]: sshd@4-10.244.11.46:22-147.75.109.163:60020.service: Deactivated successfully. Oct 29 05:37:23.557029 systemd[1]: session-5.scope: Deactivated successfully. Oct 29 05:37:23.558194 systemd-logind[1187]: Removed session 5. Oct 29 05:37:23.698325 systemd[1]: Started sshd@5-10.244.11.46:22-147.75.109.163:60024.service. Oct 29 05:37:24.598944 sshd[1327]: Accepted publickey for core from 147.75.109.163 port 60024 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:24.601491 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:24.608926 systemd[1]: Started session-6.scope. Oct 29 05:37:24.609888 systemd-logind[1187]: New session 6 of user core. Oct 29 05:37:25.080241 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 29 05:37:25.080670 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 05:37:25.085140 sudo[1331]: pam_unix(sudo:session): session closed for user root Oct 29 05:37:25.092281 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 29 05:37:25.092660 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 05:37:25.107974 systemd[1]: Stopping audit-rules.service... Oct 29 05:37:25.108000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 05:37:25.110621 kernel: kauditd_printk_skb: 182 callbacks suppressed Oct 29 05:37:25.110769 kernel: audit: type=1305 audit(1761716245.108:225): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 05:37:25.114081 auditctl[1334]: No rules Oct 29 05:37:25.108000 audit[1334]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeec0a580 a2=420 a3=0 items=0 ppid=1 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:25.121086 kernel: audit: type=1300 audit(1761716245.108:225): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeec0a580 a2=420 a3=0 items=0 ppid=1 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:25.115142 systemd[1]: audit-rules.service: Deactivated successfully. Oct 29 05:37:25.115395 systemd[1]: Stopped audit-rules.service. Oct 29 05:37:25.108000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 29 05:37:25.122541 systemd[1]: Starting audit-rules.service... Oct 29 05:37:25.123873 kernel: audit: type=1327 audit(1761716245.108:225): proctitle=2F7362696E2F617564697463746C002D44 Oct 29 05:37:25.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.130130 kernel: audit: type=1131 audit(1761716245.113:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.149661 augenrules[1351]: No rules Oct 29 05:37:25.151040 systemd[1]: Finished audit-rules.service. Oct 29 05:37:25.152444 sudo[1330]: pam_unix(sudo:session): session closed for user root Oct 29 05:37:25.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.151000 audit[1330]: USER_END pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.165014 kernel: audit: type=1130 audit(1761716245.150:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.165133 kernel: audit: type=1106 audit(1761716245.151:228): pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.165177 kernel: audit: type=1104 audit(1761716245.151:229): pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.151000 audit[1330]: CRED_DISP pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.302262 sshd[1327]: pam_unix(sshd:session): session closed for user core Oct 29 05:37:25.303000 audit[1327]: USER_END pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:25.305971 systemd[1]: sshd@5-10.244.11.46:22-147.75.109.163:60024.service: Deactivated successfully. Oct 29 05:37:25.307502 systemd[1]: session-6.scope: Deactivated successfully. Oct 29 05:37:25.312969 kernel: audit: type=1106 audit(1761716245.303:230): pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:25.303000 audit[1327]: CRED_DISP pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:25.319337 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. Oct 29 05:37:25.319986 kernel: audit: type=1104 audit(1761716245.303:231): pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:25.320089 kernel: audit: type=1131 audit(1761716245.304:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.11.46:22-147.75.109.163:60024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.11.46:22-147.75.109.163:60024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:25.326349 systemd-logind[1187]: Removed session 6. Oct 29 05:37:25.451634 systemd[1]: Started sshd@6-10.244.11.46:22-147.75.109.163:60032.service. Oct 29 05:37:25.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.46:22-147.75.109.163:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:26.350000 audit[1357]: USER_ACCT pid=1357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:26.351566 sshd[1357]: Accepted publickey for core from 147.75.109.163 port 60032 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:37:26.351000 audit[1357]: CRED_ACQ pid=1357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:26.351000 audit[1357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50acea40 a2=3 a3=0 items=0 ppid=1 pid=1357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:26.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:37:26.353390 sshd[1357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:37:26.359758 systemd-logind[1187]: New session 7 of user core. Oct 29 05:37:26.360517 systemd[1]: Started session-7.scope. Oct 29 05:37:26.367000 audit[1357]: USER_START pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:26.370000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:37:26.831000 audit[1360]: USER_ACCT pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:26.831000 audit[1360]: CRED_REFR pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:26.832489 sudo[1360]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 29 05:37:26.832875 sudo[1360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 05:37:26.834000 audit[1360]: USER_START pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:37:26.871787 systemd[1]: Starting docker.service... Oct 29 05:37:26.924153 env[1370]: time="2025-10-29T05:37:26.924036322Z" level=info msg="Starting up" Oct 29 05:37:26.926586 env[1370]: time="2025-10-29T05:37:26.926543409Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 29 05:37:26.926586 env[1370]: time="2025-10-29T05:37:26.926577323Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 29 05:37:26.926823 env[1370]: time="2025-10-29T05:37:26.926607136Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 29 05:37:26.926823 env[1370]: time="2025-10-29T05:37:26.926629875Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 29 05:37:26.931377 env[1370]: time="2025-10-29T05:37:26.931344832Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 29 05:37:26.931541 env[1370]: time="2025-10-29T05:37:26.931500851Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 29 05:37:26.931669 env[1370]: time="2025-10-29T05:37:26.931641957Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 29 05:37:26.931853 env[1370]: time="2025-10-29T05:37:26.931824697Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 29 05:37:26.939583 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1235596987-merged.mount: Deactivated successfully. Oct 29 05:37:26.967924 env[1370]: time="2025-10-29T05:37:26.967863771Z" level=info msg="Loading containers: start." Oct 29 05:37:27.059000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.059000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffed31652b0 a2=0 a3=7ffed316529c items=0 ppid=1370 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.059000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 29 05:37:27.062000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.062000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce6b5a610 a2=0 a3=7ffce6b5a5fc items=0 ppid=1370 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 29 05:37:27.070000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.070000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc47f29060 a2=0 a3=7ffc47f2904c items=0 ppid=1370 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.070000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 29 05:37:27.073000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.073000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcb76dae60 a2=0 a3=7ffcb76dae4c items=0 ppid=1370 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 29 05:37:27.077000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.077000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbb3a5940 a2=0 a3=7ffdbb3a592c items=0 ppid=1370 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 29 05:37:27.101000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.101000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff8f8f7260 a2=0 a3=7fff8f8f724c items=0 ppid=1370 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 29 05:37:27.109000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.109000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3f38c740 a2=0 a3=7ffd3f38c72c items=0 ppid=1370 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 29 05:37:27.113000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.113000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff981c74d0 a2=0 a3=7fff981c74bc items=0 ppid=1370 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 29 05:37:27.116000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.116000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe279cda50 a2=0 a3=7ffe279cda3c items=0 ppid=1370 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 05:37:27.141000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.141000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdc2675a50 a2=0 a3=7ffdc2675a3c items=0 ppid=1370 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 29 05:37:27.146000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.146000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffceb2ef90 a2=0 a3=7fffceb2ef7c items=0 ppid=1370 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 05:37:27.161953 kernel: Initializing XFRM netlink socket Oct 29 05:37:27.208149 env[1370]: time="2025-10-29T05:37:27.208080850Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 29 05:37:27.248000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.248000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeb22d66c0 a2=0 a3=7ffeb22d66ac items=0 ppid=1370 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 29 05:37:27.261000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.261000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdc28cf030 a2=0 a3=7ffdc28cf01c items=0 ppid=1370 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 29 05:37:27.267000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.267000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc08b26710 a2=0 a3=7ffc08b266fc items=0 ppid=1370 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 29 05:37:27.271000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.271000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdaad6bf70 a2=0 a3=7ffdaad6bf5c items=0 ppid=1370 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.271000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 29 05:37:27.275000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.275000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffecfcc8ce0 a2=0 a3=7ffecfcc8ccc items=0 ppid=1370 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.275000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 29 05:37:27.279000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.279000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc0b105530 a2=0 a3=7ffc0b10551c items=0 ppid=1370 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.279000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 29 05:37:27.282000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.282000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd5ec0a50 a2=0 a3=7fffd5ec0a3c items=0 ppid=1370 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 29 05:37:27.294000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.294000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff79376ff0 a2=0 a3=7fff79376fdc items=0 ppid=1370 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 29 05:37:27.299000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.299000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcbb4761e0 a2=0 a3=7ffcbb4761cc items=0 ppid=1370 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 29 05:37:27.303000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.303000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd3e4c4ca0 a2=0 a3=7ffd3e4c4c8c items=0 ppid=1370 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 29 05:37:27.306000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.306000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4228b9d0 a2=0 a3=7ffd4228b9bc items=0 ppid=1370 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 29 05:37:27.308683 systemd-networkd[1026]: docker0: Link UP Oct 29 05:37:27.320000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.320000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd6ae218f0 a2=0 a3=7ffd6ae218dc items=0 ppid=1370 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 29 05:37:27.326000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:27.326000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffedc869ce0 a2=0 a3=7ffedc869ccc items=0 ppid=1370 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:27.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 05:37:27.328179 env[1370]: time="2025-10-29T05:37:27.328137393Z" level=info msg="Loading containers: done." Oct 29 05:37:27.346059 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck238481180-merged.mount: Deactivated successfully. Oct 29 05:37:27.377183 env[1370]: time="2025-10-29T05:37:27.377031634Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 29 05:37:27.378942 env[1370]: time="2025-10-29T05:37:27.378897362Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 29 05:37:27.379135 env[1370]: time="2025-10-29T05:37:27.379109299Z" level=info msg="Daemon has completed initialization" Oct 29 05:37:27.397367 systemd[1]: Started docker.service. Oct 29 05:37:27.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:27.409055 env[1370]: time="2025-10-29T05:37:27.408974592Z" level=info msg="API listen on /run/docker.sock" Oct 29 05:37:28.252136 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 29 05:37:28.252661 systemd[1]: Stopped kubelet.service. Oct 29 05:37:28.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:28.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:28.256452 systemd[1]: Starting kubelet.service... Oct 29 05:37:28.415203 systemd[1]: Started kubelet.service. Oct 29 05:37:28.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:28.545319 kubelet[1500]: E1029 05:37:28.545141 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 05:37:28.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:28.547701 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 05:37:28.547950 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 05:37:28.655366 env[1199]: time="2025-10-29T05:37:28.655215368Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Oct 29 05:37:29.572859 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1670357150.mount: Deactivated successfully. Oct 29 05:37:32.329345 env[1199]: time="2025-10-29T05:37:32.329249853Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:32.333023 env[1199]: time="2025-10-29T05:37:32.332970955Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:32.335871 env[1199]: time="2025-10-29T05:37:32.334531986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:32.337453 env[1199]: time="2025-10-29T05:37:32.337387527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:32.338670 env[1199]: time="2025-10-29T05:37:32.338605197Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Oct 29 05:37:32.339861 env[1199]: time="2025-10-29T05:37:32.339825437Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Oct 29 05:37:35.144418 env[1199]: time="2025-10-29T05:37:35.144198572Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:35.147371 env[1199]: time="2025-10-29T05:37:35.147321247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:35.150536 env[1199]: time="2025-10-29T05:37:35.150500184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:35.154269 env[1199]: time="2025-10-29T05:37:35.153440320Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:35.154837 env[1199]: time="2025-10-29T05:37:35.154793921Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Oct 29 05:37:35.156706 env[1199]: time="2025-10-29T05:37:35.156655839Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Oct 29 05:37:35.677149 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 29 05:37:35.687059 kernel: kauditd_printk_skb: 88 callbacks suppressed Oct 29 05:37:35.687362 kernel: audit: type=1131 audit(1761716255.676:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:35.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:35.704000 audit: BPF prog-id=46 op=UNLOAD Oct 29 05:37:35.704000 audit: BPF prog-id=45 op=UNLOAD Oct 29 05:37:35.709696 kernel: audit: type=1334 audit(1761716255.704:272): prog-id=46 op=UNLOAD Oct 29 05:37:35.709790 kernel: audit: type=1334 audit(1761716255.704:273): prog-id=45 op=UNLOAD Oct 29 05:37:35.709868 kernel: audit: type=1334 audit(1761716255.704:274): prog-id=44 op=UNLOAD Oct 29 05:37:35.704000 audit: BPF prog-id=44 op=UNLOAD Oct 29 05:37:37.571468 env[1199]: time="2025-10-29T05:37:37.571336043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:37.574185 env[1199]: time="2025-10-29T05:37:37.574136652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:37.576806 env[1199]: time="2025-10-29T05:37:37.576762756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:37.582181 env[1199]: time="2025-10-29T05:37:37.582127895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:37.585584 env[1199]: time="2025-10-29T05:37:37.585501891Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Oct 29 05:37:37.587645 env[1199]: time="2025-10-29T05:37:37.587596961Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Oct 29 05:37:38.809793 kernel: audit: type=1130 audit(1761716258.800:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:38.810938 kernel: audit: type=1131 audit(1761716258.800:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:38.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:38.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:38.800795 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 29 05:37:38.801362 systemd[1]: Stopped kubelet.service. Oct 29 05:37:38.812751 systemd[1]: Starting kubelet.service... Oct 29 05:37:39.062328 systemd[1]: Started kubelet.service. Oct 29 05:37:39.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:39.068944 kernel: audit: type=1130 audit(1761716259.061:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:39.141081 kubelet[1515]: E1029 05:37:39.140988 1515 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 05:37:39.143864 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 05:37:39.144148 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 05:37:39.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:39.150943 kernel: audit: type=1131 audit(1761716259.143:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:39.969178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2481335188.mount: Deactivated successfully. Oct 29 05:37:41.352275 env[1199]: time="2025-10-29T05:37:41.352099261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:41.355314 env[1199]: time="2025-10-29T05:37:41.355266342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:41.358223 env[1199]: time="2025-10-29T05:37:41.358187784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:41.361071 env[1199]: time="2025-10-29T05:37:41.361035295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:41.362079 env[1199]: time="2025-10-29T05:37:41.362026365Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Oct 29 05:37:41.364288 env[1199]: time="2025-10-29T05:37:41.364229455Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Oct 29 05:37:42.121966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1461693871.mount: Deactivated successfully. Oct 29 05:37:42.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.46:22-80.94.95.116:18052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:42.693285 kernel: audit: type=1130 audit(1761716262.683:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.46:22-80.94.95.116:18052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:42.684186 systemd[1]: Started sshd@7-10.244.11.46:22-80.94.95.116:18052.service. Oct 29 05:37:46.043812 sshd[1521]: Invalid user admin from 80.94.95.116 port 18052 Oct 29 05:37:46.189877 sshd[1521]: pam_faillock(sshd:auth): User unknown Oct 29 05:37:46.191124 sshd[1521]: pam_unix(sshd:auth): check pass; user unknown Oct 29 05:37:46.191214 sshd[1521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.95.116 Oct 29 05:37:46.192262 sshd[1521]: pam_faillock(sshd:auth): User unknown Oct 29 05:37:46.191000 audit[1521]: USER_AUTH pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=80.94.95.116 addr=80.94.95.116 terminal=ssh res=failed' Oct 29 05:37:46.198999 kernel: audit: type=1100 audit(1761716266.191:280): pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=80.94.95.116 addr=80.94.95.116 terminal=ssh res=failed' Oct 29 05:37:46.486234 env[1199]: time="2025-10-29T05:37:46.486132394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:46.488417 env[1199]: time="2025-10-29T05:37:46.488365145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:46.491154 env[1199]: time="2025-10-29T05:37:46.491109403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:46.493653 env[1199]: time="2025-10-29T05:37:46.493615410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:46.494958 env[1199]: time="2025-10-29T05:37:46.494874982Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Oct 29 05:37:46.497174 env[1199]: time="2025-10-29T05:37:46.497138962Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 29 05:37:47.197507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2128791533.mount: Deactivated successfully. Oct 29 05:37:47.209314 env[1199]: time="2025-10-29T05:37:47.209223608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:47.212852 env[1199]: time="2025-10-29T05:37:47.212814662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:47.215499 env[1199]: time="2025-10-29T05:37:47.215463214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:47.217869 env[1199]: time="2025-10-29T05:37:47.217832950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:47.218684 env[1199]: time="2025-10-29T05:37:47.218577079Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 29 05:37:47.219812 env[1199]: time="2025-10-29T05:37:47.219760698Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Oct 29 05:37:47.995516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1327257303.mount: Deactivated successfully. Oct 29 05:37:48.612820 sshd[1521]: Failed password for invalid user admin from 80.94.95.116 port 18052 ssh2 Oct 29 05:37:49.339779 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 29 05:37:49.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.347937 kernel: audit: type=1130 audit(1761716269.339:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.340122 systemd[1]: Stopped kubelet.service. Oct 29 05:37:49.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.346035 systemd[1]: Starting kubelet.service... Oct 29 05:37:49.353979 kernel: audit: type=1131 audit(1761716269.339:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.825134 kernel: audit: type=1130 audit(1761716269.817:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.818023 systemd[1]: Started kubelet.service. Oct 29 05:37:49.917218 kubelet[1527]: E1029 05:37:49.917125 1527 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 05:37:49.919098 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 05:37:49.919361 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 05:37:49.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:49.925949 kernel: audit: type=1131 audit(1761716269.918:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:49.942164 sshd[1521]: Connection closed by invalid user admin 80.94.95.116 port 18052 [preauth] Oct 29 05:37:49.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.46:22-80.94.95.116:18052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:49.944488 systemd[1]: sshd@7-10.244.11.46:22-80.94.95.116:18052.service: Deactivated successfully. Oct 29 05:37:49.953195 kernel: audit: type=1131 audit(1761716269.943:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.46:22-80.94.95.116:18052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:50.181440 update_engine[1190]: I1029 05:37:50.181212 1190 update_attempter.cc:509] Updating boot flags... Oct 29 05:37:51.820793 env[1199]: time="2025-10-29T05:37:51.820652126Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:51.823351 env[1199]: time="2025-10-29T05:37:51.823316442Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:51.826382 env[1199]: time="2025-10-29T05:37:51.826348687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:51.829451 env[1199]: time="2025-10-29T05:37:51.829390615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:51.831119 env[1199]: time="2025-10-29T05:37:51.831035535Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Oct 29 05:37:56.802594 systemd[1]: Stopped kubelet.service. Oct 29 05:37:56.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:56.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:56.813667 kernel: audit: type=1130 audit(1761716276.801:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:56.813819 kernel: audit: type=1131 audit(1761716276.801:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:56.811213 systemd[1]: Starting kubelet.service... Oct 29 05:37:56.848001 systemd[1]: Reloading. Oct 29 05:37:56.985262 /usr/lib/systemd/system-generators/torcx-generator[1593]: time="2025-10-29T05:37:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 05:37:56.985317 /usr/lib/systemd/system-generators/torcx-generator[1593]: time="2025-10-29T05:37:56Z" level=info msg="torcx already run" Oct 29 05:37:57.113341 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 05:37:57.113677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 05:37:57.143143 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.254640 kernel: audit: type=1400 audit(1761716277.242:288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.254735 kernel: audit: type=1400 audit(1761716277.242:289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.254798 kernel: audit: type=1400 audit(1761716277.242:290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.265929 kernel: audit: type=1400 audit(1761716277.242:291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.276553 kernel: audit: type=1400 audit(1761716277.242:292): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.276645 kernel: audit: type=1400 audit(1761716277.242:293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.288075 kernel: audit: type=1400 audit(1761716277.242:294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.288174 kernel: audit: type=1400 audit(1761716277.242:295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.242000 audit: BPF prog-id=49 op=LOAD Oct 29 05:37:57.242000 audit: BPF prog-id=39 op=UNLOAD Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.257000 audit: BPF prog-id=50 op=LOAD Oct 29 05:37:57.257000 audit: BPF prog-id=47 op=UNLOAD Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit: BPF prog-id=51 op=LOAD Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.274000 audit: BPF prog-id=52 op=LOAD Oct 29 05:37:57.274000 audit: BPF prog-id=30 op=UNLOAD Oct 29 05:37:57.274000 audit: BPF prog-id=31 op=UNLOAD Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit: BPF prog-id=53 op=LOAD Oct 29 05:37:57.281000 audit: BPF prog-id=41 op=UNLOAD Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit: BPF prog-id=54 op=LOAD Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.291000 audit: BPF prog-id=55 op=LOAD Oct 29 05:37:57.291000 audit: BPF prog-id=42 op=UNLOAD Oct 29 05:37:57.291000 audit: BPF prog-id=43 op=UNLOAD Oct 29 05:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit: BPF prog-id=56 op=LOAD Oct 29 05:37:57.294000 audit: BPF prog-id=32 op=UNLOAD Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit: BPF prog-id=57 op=LOAD Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.294000 audit: BPF prog-id=58 op=LOAD Oct 29 05:37:57.294000 audit: BPF prog-id=33 op=UNLOAD Oct 29 05:37:57.294000 audit: BPF prog-id=34 op=UNLOAD Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.298000 audit: BPF prog-id=59 op=LOAD Oct 29 05:37:57.298000 audit: BPF prog-id=40 op=UNLOAD Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.299000 audit: BPF prog-id=60 op=LOAD Oct 29 05:37:57.299000 audit: BPF prog-id=35 op=UNLOAD Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit: BPF prog-id=61 op=LOAD Oct 29 05:37:57.304000 audit: BPF prog-id=36 op=UNLOAD Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit: BPF prog-id=62 op=LOAD Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:57.305000 audit: BPF prog-id=63 op=LOAD Oct 29 05:37:57.305000 audit: BPF prog-id=37 op=UNLOAD Oct 29 05:37:57.305000 audit: BPF prog-id=38 op=UNLOAD Oct 29 05:37:57.328832 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Oct 29 05:37:57.329237 systemd[1]: kubelet.service: Failed with result 'signal'. Oct 29 05:37:57.329762 systemd[1]: Stopped kubelet.service. Oct 29 05:37:57.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 05:37:57.332901 systemd[1]: Starting kubelet.service... Oct 29 05:37:57.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:37:57.661746 systemd[1]: Started kubelet.service. Oct 29 05:37:57.759399 kubelet[1645]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 05:37:57.760082 kubelet[1645]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 05:37:57.760190 kubelet[1645]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 05:37:57.760450 kubelet[1645]: I1029 05:37:57.760393 1645 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 05:37:58.541165 kubelet[1645]: I1029 05:37:58.541094 1645 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 29 05:37:58.541637 kubelet[1645]: I1029 05:37:58.541610 1645 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 05:37:58.542374 kubelet[1645]: I1029 05:37:58.542347 1645 server.go:956] "Client rotation is on, will bootstrap in background" Oct 29 05:37:58.573805 kubelet[1645]: E1029 05:37:58.573724 1645 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.11.46:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 29 05:37:58.574313 kubelet[1645]: I1029 05:37:58.574276 1645 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 05:37:58.590611 kubelet[1645]: E1029 05:37:58.590552 1645 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 05:37:58.590857 kubelet[1645]: I1029 05:37:58.590831 1645 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 05:37:58.598756 kubelet[1645]: I1029 05:37:58.598729 1645 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 05:37:58.599378 kubelet[1645]: I1029 05:37:58.599338 1645 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 05:37:58.599789 kubelet[1645]: I1029 05:37:58.599492 1645 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-gd80c.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 05:37:58.602800 kubelet[1645]: I1029 05:37:58.602662 1645 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 05:37:58.603217 kubelet[1645]: I1029 05:37:58.603193 1645 container_manager_linux.go:303] "Creating device plugin manager" Oct 29 05:37:58.605041 kubelet[1645]: I1029 05:37:58.605016 1645 state_mem.go:36] "Initialized new in-memory state store" Oct 29 05:37:58.611316 kubelet[1645]: I1029 05:37:58.611251 1645 kubelet.go:480] "Attempting to sync node with API server" Oct 29 05:37:58.611557 kubelet[1645]: I1029 05:37:58.611515 1645 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 05:37:58.611759 kubelet[1645]: I1029 05:37:58.611734 1645 kubelet.go:386] "Adding apiserver pod source" Oct 29 05:37:58.614976 kubelet[1645]: I1029 05:37:58.614905 1645 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 05:37:58.634825 kubelet[1645]: E1029 05:37:58.634755 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.11.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-gd80c.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 29 05:37:58.635995 kubelet[1645]: I1029 05:37:58.635967 1645 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 05:37:58.636827 kubelet[1645]: I1029 05:37:58.636800 1645 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 29 05:37:58.637866 kubelet[1645]: W1029 05:37:58.637840 1645 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 29 05:37:58.645422 kubelet[1645]: E1029 05:37:58.645382 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.11.46:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 29 05:37:58.647260 kubelet[1645]: I1029 05:37:58.647232 1645 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 05:37:58.647469 kubelet[1645]: I1029 05:37:58.647445 1645 server.go:1289] "Started kubelet" Oct 29 05:37:58.651139 kubelet[1645]: I1029 05:37:58.651093 1645 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 05:37:58.649000 audit[1645]: AVC avc: denied { mac_admin } for pid=1645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:58.649000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:37:58.649000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c52390 a1=c000bdbbd8 a2=c000c52360 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:37:58.649000 audit[1645]: AVC avc: denied { mac_admin } for pid=1645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:58.649000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:37:58.649000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c331c0 a1=c000bdbbf0 a2=c000c52420 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:37:58.652501 kubelet[1645]: I1029 05:37:58.651605 1645 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 05:37:58.652501 kubelet[1645]: I1029 05:37:58.651677 1645 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 05:37:58.652501 kubelet[1645]: I1029 05:37:58.651819 1645 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 05:37:58.655623 kubelet[1645]: I1029 05:37:58.655162 1645 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 05:37:58.656538 kubelet[1645]: I1029 05:37:58.656512 1645 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 05:37:58.660006 kubelet[1645]: I1029 05:37:58.659969 1645 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 05:37:58.660551 kubelet[1645]: I1029 05:37:58.660524 1645 server.go:317] "Adding debug handlers to kubelet server" Oct 29 05:37:58.665039 kubelet[1645]: I1029 05:37:58.663865 1645 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 05:37:58.665039 kubelet[1645]: E1029 05:37:58.664388 1645 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-gd80c.gb1.brightbox.com\" not found" Oct 29 05:37:58.667223 kubelet[1645]: I1029 05:37:58.667176 1645 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 05:37:58.670066 kubelet[1645]: E1029 05:37:58.668673 1645 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.11.46:6443/api/v1/namespaces/default/events\": dial tcp 10.244.11.46:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-gd80c.gb1.brightbox.com.1872df9f17cd13da default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-gd80c.gb1.brightbox.com,UID:srv-gd80c.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-gd80c.gb1.brightbox.com,},FirstTimestamp:2025-10-29 05:37:58.64739529 +0000 UTC m=+0.976358782,LastTimestamp:2025-10-29 05:37:58.64739529 +0000 UTC m=+0.976358782,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-gd80c.gb1.brightbox.com,}" Oct 29 05:37:58.672839 kubelet[1645]: E1029 05:37:58.672792 1645 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-gd80c.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.46:6443: connect: connection refused" interval="200ms" Oct 29 05:37:58.674133 kubelet[1645]: I1029 05:37:58.674107 1645 factory.go:223] Registration of the containerd container factory successfully Oct 29 05:37:58.674298 kubelet[1645]: I1029 05:37:58.674279 1645 factory.go:223] Registration of the systemd container factory successfully Oct 29 05:37:58.673000 audit[1661]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.673000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe0fbe740 a2=0 a3=7fffe0fbe72c items=0 ppid=1645 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 05:37:58.674000 audit[1662]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.674000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce5307530 a2=0 a3=7ffce530751c items=0 ppid=1645 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 05:37:58.678743 kubelet[1645]: I1029 05:37:58.678708 1645 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 05:37:58.678829 kubelet[1645]: I1029 05:37:58.678807 1645 reconciler.go:26] "Reconciler: start to sync state" Oct 29 05:37:58.678000 audit[1664]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.678000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff797a29b0 a2=0 a3=7fff797a299c items=0 ppid=1645 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 05:37:58.681000 audit[1666]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.681000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4ac65100 a2=0 a3=7ffd4ac650ec items=0 ppid=1645 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 05:37:58.701235 kubelet[1645]: E1029 05:37:58.700597 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.11.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 29 05:37:58.699000 audit[1670]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.699000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffce863f700 a2=0 a3=7ffce863f6ec items=0 ppid=1645 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 29 05:37:58.707114 kubelet[1645]: E1029 05:37:58.707083 1645 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 05:37:58.707874 kubelet[1645]: I1029 05:37:58.707831 1645 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 29 05:37:58.712000 audit[1678]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:37:58.712000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff536e4130 a2=0 a3=7fff536e411c items=0 ppid=1645 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 05:37:58.715225 kubelet[1645]: I1029 05:37:58.715193 1645 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 29 05:37:58.715440 kubelet[1645]: I1029 05:37:58.715416 1645 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 29 05:37:58.715594 kubelet[1645]: I1029 05:37:58.715558 1645 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 05:37:58.715721 kubelet[1645]: I1029 05:37:58.715698 1645 kubelet.go:2436] "Starting kubelet main sync loop" Oct 29 05:37:58.715953 kubelet[1645]: E1029 05:37:58.715880 1645 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 29 05:37:58.719215 kubelet[1645]: I1029 05:37:58.719187 1645 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 05:37:58.717000 audit[1679]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:37:58.717000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5ad06320 a2=0 a3=7ffe5ad0630c items=0 ppid=1645 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 05:37:58.720521 kubelet[1645]: I1029 05:37:58.720497 1645 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 05:37:58.720700 kubelet[1645]: I1029 05:37:58.720679 1645 state_mem.go:36] "Initialized new in-memory state store" Oct 29 05:37:58.719000 audit[1677]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.719000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedbd09370 a2=0 a3=7ffedbd0935c items=0 ppid=1645 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 05:37:58.722000 audit[1680]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:37:58.722000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcacdd1010 a2=0 a3=7ffcacdd0ffc items=0 ppid=1645 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 05:37:58.725000 audit[1682]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:37:58.725000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4a37cf10 a2=0 a3=7fff4a37cefc items=0 ppid=1645 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 05:37:58.728876 kubelet[1645]: E1029 05:37:58.728839 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.11.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 29 05:37:58.728000 audit[1684]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.728000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc69020c80 a2=0 a3=7ffc69020c6c items=0 ppid=1645 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 05:37:58.730000 audit[1685]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:37:58.730000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea78e78a0 a2=0 a3=7ffea78e788c items=0 ppid=1645 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 05:37:58.756704 kubelet[1645]: I1029 05:37:58.756657 1645 policy_none.go:49] "None policy: Start" Oct 29 05:37:58.757085 kubelet[1645]: I1029 05:37:58.757057 1645 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 05:37:58.757236 kubelet[1645]: I1029 05:37:58.757213 1645 state_mem.go:35] "Initializing new in-memory state store" Oct 29 05:37:58.765392 kubelet[1645]: E1029 05:37:58.765341 1645 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-gd80c.gb1.brightbox.com\" not found" Oct 29 05:37:58.773723 systemd[1]: Created slice kubepods.slice. Oct 29 05:37:58.781727 systemd[1]: Created slice kubepods-burstable.slice. Oct 29 05:37:58.786334 systemd[1]: Created slice kubepods-besteffort.slice. Oct 29 05:37:58.794948 kubelet[1645]: E1029 05:37:58.793188 1645 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 29 05:37:58.795254 kubelet[1645]: E1029 05:37:58.795213 1645 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 29 05:37:58.793000 audit[1645]: AVC avc: denied { mac_admin } for pid=1645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:37:58.793000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:37:58.793000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae5da0 a1=c000acbf98 a2=c000ae5d70 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:37:58.793000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:37:58.796076 kubelet[1645]: I1029 05:37:58.796053 1645 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 05:37:58.796441 kubelet[1645]: I1029 05:37:58.796386 1645 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 05:37:58.797237 kubelet[1645]: I1029 05:37:58.797212 1645 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 05:37:58.801274 kubelet[1645]: E1029 05:37:58.801247 1645 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 05:37:58.801517 kubelet[1645]: E1029 05:37:58.801475 1645 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-gd80c.gb1.brightbox.com\" not found" Oct 29 05:37:58.874488 systemd[1]: Created slice kubepods-burstable-pod6bdc4db6de416b0681155eff29806db8.slice. Oct 29 05:37:58.876976 kubelet[1645]: E1029 05:37:58.876602 1645 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-gd80c.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.46:6443: connect: connection refused" interval="400ms" Oct 29 05:37:58.879152 kubelet[1645]: I1029 05:37:58.879114 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-kubeconfig\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.879369 kubelet[1645]: I1029 05:37:58.879318 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-ca-certs\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.879621 kubelet[1645]: I1029 05:37:58.879581 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-usr-share-ca-certificates\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.879800 kubelet[1645]: I1029 05:37:58.879764 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-flexvolume-dir\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.879989 kubelet[1645]: I1029 05:37:58.879961 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.880169 kubelet[1645]: I1029 05:37:58.880133 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a48ab14de85a9c043adbe5053fe5e0a8-kubeconfig\") pod \"kube-scheduler-srv-gd80c.gb1.brightbox.com\" (UID: \"a48ab14de85a9c043adbe5053fe5e0a8\") " pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.880338 kubelet[1645]: I1029 05:37:58.880303 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-k8s-certs\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.880516 kubelet[1645]: I1029 05:37:58.880481 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-ca-certs\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.880700 kubelet[1645]: I1029 05:37:58.880661 1645 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-k8s-certs\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.883223 kubelet[1645]: E1029 05:37:58.882998 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.887570 systemd[1]: Created slice kubepods-burstable-pod21b3fd6b5460449163d469528b14a43f.slice. Oct 29 05:37:58.893023 systemd[1]: Created slice kubepods-burstable-poda48ab14de85a9c043adbe5053fe5e0a8.slice. Oct 29 05:37:58.893443 kubelet[1645]: E1029 05:37:58.893414 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.895437 kubelet[1645]: E1029 05:37:58.895411 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.900164 kubelet[1645]: I1029 05:37:58.900134 1645 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:58.900695 kubelet[1645]: E1029 05:37:58.900657 1645 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.46:6443/api/v1/nodes\": dial tcp 10.244.11.46:6443: connect: connection refused" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:59.104726 kubelet[1645]: I1029 05:37:59.104678 1645 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:59.105309 kubelet[1645]: E1029 05:37:59.105248 1645 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.46:6443/api/v1/nodes\": dial tcp 10.244.11.46:6443: connect: connection refused" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:59.184998 env[1199]: time="2025-10-29T05:37:59.184896478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-gd80c.gb1.brightbox.com,Uid:6bdc4db6de416b0681155eff29806db8,Namespace:kube-system,Attempt:0,}" Oct 29 05:37:59.194942 env[1199]: time="2025-10-29T05:37:59.194758848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-gd80c.gb1.brightbox.com,Uid:21b3fd6b5460449163d469528b14a43f,Namespace:kube-system,Attempt:0,}" Oct 29 05:37:59.197943 env[1199]: time="2025-10-29T05:37:59.197799282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-gd80c.gb1.brightbox.com,Uid:a48ab14de85a9c043adbe5053fe5e0a8,Namespace:kube-system,Attempt:0,}" Oct 29 05:37:59.278020 kubelet[1645]: E1029 05:37:59.277948 1645 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-gd80c.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.46:6443: connect: connection refused" interval="800ms" Oct 29 05:37:59.510144 kubelet[1645]: I1029 05:37:59.509952 1645 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:59.511529 kubelet[1645]: E1029 05:37:59.511448 1645 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.46:6443/api/v1/nodes\": dial tcp 10.244.11.46:6443: connect: connection refused" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:37:59.773461 kubelet[1645]: E1029 05:37:59.773298 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.11.46:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 29 05:37:59.956413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount101328525.mount: Deactivated successfully. Oct 29 05:37:59.964212 env[1199]: time="2025-10-29T05:37:59.964160685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.966621 env[1199]: time="2025-10-29T05:37:59.966543457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.967766 env[1199]: time="2025-10-29T05:37:59.967730919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.971846 env[1199]: time="2025-10-29T05:37:59.971807842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.974127 env[1199]: time="2025-10-29T05:37:59.974092880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.987051 env[1199]: time="2025-10-29T05:37:59.986996255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.990302 env[1199]: time="2025-10-29T05:37:59.990256921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.991379 env[1199]: time="2025-10-29T05:37:59.991344513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.992788 env[1199]: time="2025-10-29T05:37:59.992716941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.994409 kubelet[1645]: E1029 05:37:59.994344 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.11.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 29 05:37:59.994668 env[1199]: time="2025-10-29T05:37:59.994632879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.996270 env[1199]: time="2025-10-29T05:37:59.996226390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:37:59.997604 env[1199]: time="2025-10-29T05:37:59.997565613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:00.007008 kubelet[1645]: E1029 05:38:00.006950 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.11.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-gd80c.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 29 05:38:00.022167 env[1199]: time="2025-10-29T05:38:00.017115696Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:00.022167 env[1199]: time="2025-10-29T05:38:00.017242528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:00.022167 env[1199]: time="2025-10-29T05:38:00.017261857Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:00.022167 env[1199]: time="2025-10-29T05:38:00.017655277Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b08b7fa898c641213ed2de167be3c80d1f1b06934e9a5faf4837442e2bc50ac0 pid=1694 runtime=io.containerd.runc.v2 Oct 29 05:38:00.048698 systemd[1]: Started cri-containerd-b08b7fa898c641213ed2de167be3c80d1f1b06934e9a5faf4837442e2bc50ac0.scope. Oct 29 05:38:00.051344 env[1199]: time="2025-10-29T05:38:00.051262432Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:00.051580 env[1199]: time="2025-10-29T05:38:00.051511593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:00.051808 env[1199]: time="2025-10-29T05:38:00.051753903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:00.052457 env[1199]: time="2025-10-29T05:38:00.052209309Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24c99d940cc4af1a6d1787b1b5eda2a4ddaaa413017875b121ca5d4833a710b2 pid=1723 runtime=io.containerd.runc.v2 Oct 29 05:38:00.075080 env[1199]: time="2025-10-29T05:38:00.074886073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:00.075392 env[1199]: time="2025-10-29T05:38:00.075335488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:00.075646 env[1199]: time="2025-10-29T05:38:00.075545192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:00.076188 env[1199]: time="2025-10-29T05:38:00.076127869Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e0e171e9529f7fd478bdbf350506fdab720d63107d423735936e4328a4ea8b6 pid=1730 runtime=io.containerd.runc.v2 Oct 29 05:38:00.078809 kubelet[1645]: E1029 05:38:00.078711 1645 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-gd80c.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.46:6443: connect: connection refused" interval="1.6s" Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.092000 audit: BPF prog-id=64 op=LOAD Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1694 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386237666138393863363431323133656432646531363762653363 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1694 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386237666138393863363431323133656432646531363762653363 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit: BPF prog-id=65 op=LOAD Oct 29 05:38:00.093000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2670 items=0 ppid=1694 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386237666138393863363431323133656432646531363762653363 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.093000 audit: BPF prog-id=66 op=LOAD Oct 29 05:38:00.093000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d26b8 items=0 ppid=1694 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386237666138393863363431323133656432646531363762653363 Oct 29 05:38:00.094000 audit: BPF prog-id=66 op=UNLOAD Oct 29 05:38:00.094000 audit: BPF prog-id=65 op=UNLOAD Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.094000 audit: BPF prog-id=67 op=LOAD Oct 29 05:38:00.094000 audit[1703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2ac8 items=0 ppid=1694 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386237666138393863363431323133656432646531363762653363 Oct 29 05:38:00.104719 systemd[1]: Started cri-containerd-24c99d940cc4af1a6d1787b1b5eda2a4ddaaa413017875b121ca5d4833a710b2.scope. Oct 29 05:38:00.129370 systemd[1]: Started cri-containerd-3e0e171e9529f7fd478bdbf350506fdab720d63107d423735936e4328a4ea8b6.scope. Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.153000 audit: BPF prog-id=68 op=LOAD Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633939643934306363346166316136643137383762316235656461 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633939643934306363346166316136643137383762316235656461 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit: BPF prog-id=69 op=LOAD Oct 29 05:38:00.154000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c1170 items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633939643934306363346166316136643137383762316235656461 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.154000 audit: BPF prog-id=70 op=LOAD Oct 29 05:38:00.154000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c11b8 items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633939643934306363346166316136643137383762316235656461 Oct 29 05:38:00.154000 audit: BPF prog-id=70 op=UNLOAD Oct 29 05:38:00.155000 audit: BPF prog-id=69 op=UNLOAD Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.155000 audit: BPF prog-id=71 op=LOAD Oct 29 05:38:00.155000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c15c8 items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633939643934306363346166316136643137383762316235656461 Oct 29 05:38:00.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.177000 audit: BPF prog-id=72 op=LOAD Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306531373165393532396637666434373862646266333530353036 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306531373165393532396637666434373862646266333530353036 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit: BPF prog-id=73 op=LOAD Oct 29 05:38:00.180000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000257ce0 items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306531373165393532396637666434373862646266333530353036 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.180000 audit: BPF prog-id=74 op=LOAD Oct 29 05:38:00.180000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000257d28 items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306531373165393532396637666434373862646266333530353036 Oct 29 05:38:00.181000 audit: BPF prog-id=74 op=UNLOAD Oct 29 05:38:00.181000 audit: BPF prog-id=73 op=UNLOAD Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.181000 audit: BPF prog-id=75 op=LOAD Oct 29 05:38:00.181000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d8138 items=0 ppid=1730 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306531373165393532396637666434373862646266333530353036 Oct 29 05:38:00.215574 env[1199]: time="2025-10-29T05:38:00.215469631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-gd80c.gb1.brightbox.com,Uid:a48ab14de85a9c043adbe5053fe5e0a8,Namespace:kube-system,Attempt:0,} returns sandbox id \"b08b7fa898c641213ed2de167be3c80d1f1b06934e9a5faf4837442e2bc50ac0\"" Oct 29 05:38:00.224290 env[1199]: time="2025-10-29T05:38:00.223631554Z" level=info msg="CreateContainer within sandbox \"b08b7fa898c641213ed2de167be3c80d1f1b06934e9a5faf4837442e2bc50ac0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 29 05:38:00.234385 env[1199]: time="2025-10-29T05:38:00.234322014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-gd80c.gb1.brightbox.com,Uid:21b3fd6b5460449163d469528b14a43f,Namespace:kube-system,Attempt:0,} returns sandbox id \"24c99d940cc4af1a6d1787b1b5eda2a4ddaaa413017875b121ca5d4833a710b2\"" Oct 29 05:38:00.240575 env[1199]: time="2025-10-29T05:38:00.240474919Z" level=info msg="CreateContainer within sandbox \"24c99d940cc4af1a6d1787b1b5eda2a4ddaaa413017875b121ca5d4833a710b2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 29 05:38:00.250520 env[1199]: time="2025-10-29T05:38:00.250463968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-gd80c.gb1.brightbox.com,Uid:6bdc4db6de416b0681155eff29806db8,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e0e171e9529f7fd478bdbf350506fdab720d63107d423735936e4328a4ea8b6\"" Oct 29 05:38:00.259169 env[1199]: time="2025-10-29T05:38:00.259109943Z" level=info msg="CreateContainer within sandbox \"3e0e171e9529f7fd478bdbf350506fdab720d63107d423735936e4328a4ea8b6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 29 05:38:00.269226 env[1199]: time="2025-10-29T05:38:00.269174688Z" level=info msg="CreateContainer within sandbox \"24c99d940cc4af1a6d1787b1b5eda2a4ddaaa413017875b121ca5d4833a710b2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"89f7b9b2ab307ca74976fccde392e7dca96b41347f7873f2a06d87a00fc24f6e\"" Oct 29 05:38:00.270342 env[1199]: time="2025-10-29T05:38:00.270305687Z" level=info msg="StartContainer for \"89f7b9b2ab307ca74976fccde392e7dca96b41347f7873f2a06d87a00fc24f6e\"" Oct 29 05:38:00.272173 env[1199]: time="2025-10-29T05:38:00.272112747Z" level=info msg="CreateContainer within sandbox \"b08b7fa898c641213ed2de167be3c80d1f1b06934e9a5faf4837442e2bc50ac0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d55561dec1652a0cfcfba466688eac7fb889575b260ee43d126a0844d9383b16\"" Oct 29 05:38:00.281148 env[1199]: time="2025-10-29T05:38:00.281092055Z" level=info msg="StartContainer for \"d55561dec1652a0cfcfba466688eac7fb889575b260ee43d126a0844d9383b16\"" Oct 29 05:38:00.283194 env[1199]: time="2025-10-29T05:38:00.283152880Z" level=info msg="CreateContainer within sandbox \"3e0e171e9529f7fd478bdbf350506fdab720d63107d423735936e4328a4ea8b6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8b1b746492f68fc014d838276d125d5da813f85c30bf138e72883e8bb01c9a71\"" Oct 29 05:38:00.283823 env[1199]: time="2025-10-29T05:38:00.283788692Z" level=info msg="StartContainer for \"8b1b746492f68fc014d838276d125d5da813f85c30bf138e72883e8bb01c9a71\"" Oct 29 05:38:00.308152 kubelet[1645]: E1029 05:38:00.300530 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.11.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 29 05:38:00.312324 systemd[1]: Started cri-containerd-8b1b746492f68fc014d838276d125d5da813f85c30bf138e72883e8bb01c9a71.scope. Oct 29 05:38:00.318821 kubelet[1645]: I1029 05:38:00.318251 1645 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:00.318821 kubelet[1645]: E1029 05:38:00.318761 1645 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.46:6443/api/v1/nodes\": dial tcp 10.244.11.46:6443: connect: connection refused" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:00.330586 systemd[1]: Started cri-containerd-89f7b9b2ab307ca74976fccde392e7dca96b41347f7873f2a06d87a00fc24f6e.scope. Oct 29 05:38:00.343519 systemd[1]: Started cri-containerd-d55561dec1652a0cfcfba466688eac7fb889575b260ee43d126a0844d9383b16.scope. Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.357000 audit: BPF prog-id=76 op=LOAD Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1730 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316237343634393266363866633031346438333832373664313235 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1730 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316237343634393266363866633031346438333832373664313235 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit: BPF prog-id=77 op=LOAD Oct 29 05:38:00.358000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c13c0 items=0 ppid=1730 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316237343634393266363866633031346438333832373664313235 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit: BPF prog-id=78 op=LOAD Oct 29 05:38:00.358000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c1408 items=0 ppid=1730 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316237343634393266363866633031346438333832373664313235 Oct 29 05:38:00.358000 audit: BPF prog-id=78 op=UNLOAD Oct 29 05:38:00.358000 audit: BPF prog-id=77 op=UNLOAD Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.358000 audit: BPF prog-id=79 op=LOAD Oct 29 05:38:00.358000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c1818 items=0 ppid=1730 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316237343634393266363866633031346438333832373664313235 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.371000 audit: BPF prog-id=80 op=LOAD Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663762396232616233303763613734393736666363646533393265 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663762396232616233303763613734393736666363646533393265 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit: BPF prog-id=81 op=LOAD Oct 29 05:38:00.372000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000335fe0 items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663762396232616233303763613734393736666363646533393265 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit: BPF prog-id=82 op=LOAD Oct 29 05:38:00.372000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000410028 items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663762396232616233303763613734393736666363646533393265 Oct 29 05:38:00.372000 audit: BPF prog-id=82 op=UNLOAD Oct 29 05:38:00.372000 audit: BPF prog-id=81 op=UNLOAD Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.372000 audit: BPF prog-id=83 op=LOAD Oct 29 05:38:00.372000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000410438 items=0 ppid=1723 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839663762396232616233303763613734393736666363646533393265 Oct 29 05:38:00.422060 env[1199]: time="2025-10-29T05:38:00.422004341Z" level=info msg="StartContainer for \"8b1b746492f68fc014d838276d125d5da813f85c30bf138e72883e8bb01c9a71\" returns successfully" Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.425000 audit: BPF prog-id=84 op=LOAD Oct 29 05:38:00.429000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.429000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353536316465633136353261306366636662613436363638386561 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353536316465633136353261306366636662613436363638386561 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.430000 audit: BPF prog-id=85 op=LOAD Oct 29 05:38:00.430000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000400200 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353536316465633136353261306366636662613436363638386561 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.432000 audit: BPF prog-id=86 op=LOAD Oct 29 05:38:00.432000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000400248 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353536316465633136353261306366636662613436363638386561 Oct 29 05:38:00.433000 audit: BPF prog-id=86 op=UNLOAD Oct 29 05:38:00.433000 audit: BPF prog-id=85 op=UNLOAD Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:00.433000 audit: BPF prog-id=87 op=LOAD Oct 29 05:38:00.433000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000400658 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:00.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435353536316465633136353261306366636662613436363638386561 Oct 29 05:38:00.463062 env[1199]: time="2025-10-29T05:38:00.462992048Z" level=info msg="StartContainer for \"89f7b9b2ab307ca74976fccde392e7dca96b41347f7873f2a06d87a00fc24f6e\" returns successfully" Oct 29 05:38:00.503985 env[1199]: time="2025-10-29T05:38:00.503895758Z" level=info msg="StartContainer for \"d55561dec1652a0cfcfba466688eac7fb889575b260ee43d126a0844d9383b16\" returns successfully" Oct 29 05:38:00.728518 kubelet[1645]: E1029 05:38:00.728472 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:00.729849 kubelet[1645]: E1029 05:38:00.729814 1645 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.11.46:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 29 05:38:00.737139 kubelet[1645]: E1029 05:38:00.737105 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:00.737326 kubelet[1645]: E1029 05:38:00.737190 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:00.791491 kubelet[1645]: E1029 05:38:00.791335 1645 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.11.46:6443/api/v1/namespaces/default/events\": dial tcp 10.244.11.46:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-gd80c.gb1.brightbox.com.1872df9f17cd13da default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-gd80c.gb1.brightbox.com,UID:srv-gd80c.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-gd80c.gb1.brightbox.com,},FirstTimestamp:2025-10-29 05:37:58.64739529 +0000 UTC m=+0.976358782,LastTimestamp:2025-10-29 05:37:58.64739529 +0000 UTC m=+0.976358782,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-gd80c.gb1.brightbox.com,}" Oct 29 05:38:01.491767 kubelet[1645]: E1029 05:38:01.491703 1645 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.11.46:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.11.46:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 29 05:38:01.638000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:01.638000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0008f4720 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:01.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:01.641000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:01.641000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000ea920 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:01.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:01.738875 kubelet[1645]: E1029 05:38:01.738825 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:01.739459 kubelet[1645]: E1029 05:38:01.739427 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:01.796525 kubelet[1645]: E1029 05:38:01.796415 1645 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:01.923628 kubelet[1645]: I1029 05:38:01.923565 1645 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.383000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.387562 kernel: kauditd_printk_skb: 562 callbacks suppressed Oct 29 05:38:03.387711 kernel: audit: type=1400 audit(1761716283.383:587): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.383000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00552ccc0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.409716 kernel: audit: type=1300 audit(1761716283.383:587): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00552ccc0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.409850 kernel: audit: type=1327 audit(1761716283.383:587): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.384000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.384000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004da9080 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.424326 kernel: audit: type=1400 audit(1761716283.384:588): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.424426 kernel: audit: type=1300 audit(1761716283.384:588): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004da9080 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.384000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525840 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.438877 kernel: audit: type=1327 audit(1761716283.384:588): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.439005 kernel: audit: type=1400 audit(1761716283.384:589): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525840 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.384000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00552cde0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.458786 kernel: audit: type=1300 audit(1761716283.384:589): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00552cde0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.458938 kernel: audit: type=1327 audit(1761716283.384:589): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.408000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.408000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004da9520 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.408000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.408000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00552d860 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.423000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525846 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.423000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c0051c2a50 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:38:03.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:38:03.469941 kernel: audit: type=1400 audit(1761716283.408:590): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:03.543846 kubelet[1645]: E1029 05:38:03.543775 1645 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-gd80c.gb1.brightbox.com\" not found" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.642065 kubelet[1645]: I1029 05:38:03.641936 1645 kubelet_node_status.go:78] "Successfully registered node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.643991 kubelet[1645]: E1029 05:38:03.643948 1645 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"srv-gd80c.gb1.brightbox.com\": node \"srv-gd80c.gb1.brightbox.com\" not found" Oct 29 05:38:03.651593 kubelet[1645]: I1029 05:38:03.651552 1645 apiserver.go:52] "Watching apiserver" Oct 29 05:38:03.668585 kubelet[1645]: I1029 05:38:03.668543 1645 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.679263 kubelet[1645]: I1029 05:38:03.679217 1645 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 05:38:03.699967 kubelet[1645]: E1029 05:38:03.699882 1645 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.700454 kubelet[1645]: I1029 05:38:03.700356 1645 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.705596 kubelet[1645]: E1029 05:38:03.705543 1645 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.705778 kubelet[1645]: I1029 05:38:03.705753 1645 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:03.707761 kubelet[1645]: E1029 05:38:03.707731 1645 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-gd80c.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:06.157047 kubelet[1645]: I1029 05:38:06.156947 1645 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:06.166537 kubelet[1645]: I1029 05:38:06.166493 1645 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 29 05:38:06.183236 systemd[1]: Reloading. Oct 29 05:38:06.317673 /usr/lib/systemd/system-generators/torcx-generator[1953]: time="2025-10-29T05:38:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 05:38:06.317728 /usr/lib/systemd/system-generators/torcx-generator[1953]: time="2025-10-29T05:38:06Z" level=info msg="torcx already run" Oct 29 05:38:06.441502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 05:38:06.442557 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 05:38:06.474766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 05:38:06.515000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:06.515000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000abb9e0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:06.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:06.519000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:06.519000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000beb8c0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:06.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:06.519000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:06.519000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000beb940 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:06.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:06.519000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:38:06.519000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000beb9c0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:06.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.609000 audit: BPF prog-id=88 op=LOAD Oct 29 05:38:06.610000 audit: BPF prog-id=49 op=UNLOAD Oct 29 05:38:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.612000 audit: BPF prog-id=89 op=LOAD Oct 29 05:38:06.613000 audit: BPF prog-id=68 op=UNLOAD Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.616000 audit: BPF prog-id=90 op=LOAD Oct 29 05:38:06.616000 audit: BPF prog-id=50 op=UNLOAD Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.622000 audit: BPF prog-id=91 op=LOAD Oct 29 05:38:06.622000 audit: BPF prog-id=76 op=UNLOAD Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.626000 audit: BPF prog-id=92 op=LOAD Oct 29 05:38:06.626000 audit: BPF prog-id=64 op=UNLOAD Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.628000 audit: BPF prog-id=93 op=LOAD Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.629000 audit: BPF prog-id=94 op=LOAD Oct 29 05:38:06.630000 audit: BPF prog-id=51 op=UNLOAD Oct 29 05:38:06.630000 audit: BPF prog-id=52 op=UNLOAD Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.633000 audit: BPF prog-id=95 op=LOAD Oct 29 05:38:06.633000 audit: BPF prog-id=72 op=UNLOAD Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.636000 audit: BPF prog-id=96 op=LOAD Oct 29 05:38:06.636000 audit: BPF prog-id=53 op=UNLOAD Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit: BPF prog-id=97 op=LOAD Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.639000 audit: BPF prog-id=98 op=LOAD Oct 29 05:38:06.639000 audit: BPF prog-id=54 op=UNLOAD Oct 29 05:38:06.639000 audit: BPF prog-id=55 op=UNLOAD Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.641000 audit: BPF prog-id=99 op=LOAD Oct 29 05:38:06.641000 audit: BPF prog-id=80 op=UNLOAD Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit: BPF prog-id=100 op=LOAD Oct 29 05:38:06.643000 audit: BPF prog-id=56 op=UNLOAD Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit: BPF prog-id=101 op=LOAD Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.643000 audit: BPF prog-id=102 op=LOAD Oct 29 05:38:06.643000 audit: BPF prog-id=57 op=UNLOAD Oct 29 05:38:06.643000 audit: BPF prog-id=58 op=UNLOAD Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.644000 audit: BPF prog-id=103 op=LOAD Oct 29 05:38:06.644000 audit: BPF prog-id=84 op=UNLOAD Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.645000 audit: BPF prog-id=104 op=LOAD Oct 29 05:38:06.645000 audit: BPF prog-id=59 op=UNLOAD Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.647000 audit: BPF prog-id=105 op=LOAD Oct 29 05:38:06.647000 audit: BPF prog-id=60 op=UNLOAD Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit: BPF prog-id=106 op=LOAD Oct 29 05:38:06.650000 audit: BPF prog-id=61 op=UNLOAD Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit: BPF prog-id=107 op=LOAD Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:06.650000 audit: BPF prog-id=108 op=LOAD Oct 29 05:38:06.650000 audit: BPF prog-id=62 op=UNLOAD Oct 29 05:38:06.650000 audit: BPF prog-id=63 op=UNLOAD Oct 29 05:38:06.678928 systemd[1]: Stopping kubelet.service... Oct 29 05:38:06.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:38:06.696621 systemd[1]: kubelet.service: Deactivated successfully. Oct 29 05:38:06.696965 systemd[1]: Stopped kubelet.service. Oct 29 05:38:06.697095 systemd[1]: kubelet.service: Consumed 1.559s CPU time. Oct 29 05:38:06.703585 systemd[1]: Starting kubelet.service... Oct 29 05:38:08.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:38:08.081871 systemd[1]: Started kubelet.service. Oct 29 05:38:08.208331 kubelet[2003]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 05:38:08.209149 kubelet[2003]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 05:38:08.210049 kubelet[2003]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 05:38:08.210419 kubelet[2003]: I1029 05:38:08.210359 2003 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 05:38:08.231390 kubelet[2003]: I1029 05:38:08.230774 2003 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 29 05:38:08.231390 kubelet[2003]: I1029 05:38:08.230818 2003 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 05:38:08.232832 kubelet[2003]: I1029 05:38:08.232802 2003 server.go:956] "Client rotation is on, will bootstrap in background" Oct 29 05:38:08.235768 kubelet[2003]: I1029 05:38:08.235238 2003 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Oct 29 05:38:08.267333 kubelet[2003]: I1029 05:38:08.267286 2003 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 05:38:08.276666 kubelet[2003]: E1029 05:38:08.276364 2003 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 05:38:08.276666 kubelet[2003]: I1029 05:38:08.276439 2003 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 05:38:08.283655 kubelet[2003]: I1029 05:38:08.283052 2003 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 05:38:08.283655 kubelet[2003]: I1029 05:38:08.283413 2003 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 05:38:08.283824 kubelet[2003]: I1029 05:38:08.283455 2003 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-gd80c.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 05:38:08.283824 kubelet[2003]: I1029 05:38:08.283782 2003 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 05:38:08.283824 kubelet[2003]: I1029 05:38:08.283803 2003 container_manager_linux.go:303] "Creating device plugin manager" Oct 29 05:38:08.284231 kubelet[2003]: I1029 05:38:08.283960 2003 state_mem.go:36] "Initialized new in-memory state store" Oct 29 05:38:08.284328 kubelet[2003]: I1029 05:38:08.284303 2003 kubelet.go:480] "Attempting to sync node with API server" Oct 29 05:38:08.284410 kubelet[2003]: I1029 05:38:08.284339 2003 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 05:38:08.284500 kubelet[2003]: I1029 05:38:08.284421 2003 kubelet.go:386] "Adding apiserver pod source" Oct 29 05:38:08.284500 kubelet[2003]: I1029 05:38:08.284452 2003 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 05:38:08.287874 kubelet[2003]: I1029 05:38:08.287097 2003 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 05:38:08.288006 kubelet[2003]: I1029 05:38:08.287895 2003 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 29 05:38:08.297870 kubelet[2003]: I1029 05:38:08.297617 2003 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 05:38:08.297870 kubelet[2003]: I1029 05:38:08.297699 2003 server.go:1289] "Started kubelet" Oct 29 05:38:08.311450 kubelet[2003]: I1029 05:38:08.311396 2003 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 05:38:08.312830 kubelet[2003]: I1029 05:38:08.312771 2003 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 05:38:08.313628 kubelet[2003]: I1029 05:38:08.313602 2003 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 05:38:08.337000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:08.337000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:38:08.337000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf2ea0 a1=c000c74738 a2=c000cf2e70 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:08.337000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:38:08.338000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:08.338000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:38:08.338000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c5f020 a1=c000c74750 a2=c000cf2f30 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:08.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:38:08.340777 kubelet[2003]: I1029 05:38:08.339118 2003 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 05:38:08.340777 kubelet[2003]: I1029 05:38:08.339352 2003 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 05:38:08.342823 kubelet[2003]: I1029 05:38:08.342794 2003 server.go:317] "Adding debug handlers to kubelet server" Oct 29 05:38:08.343487 kubelet[2003]: I1029 05:38:08.343427 2003 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 05:38:08.352873 kubelet[2003]: I1029 05:38:08.352223 2003 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 05:38:08.357053 kubelet[2003]: I1029 05:38:08.356874 2003 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 05:38:08.366518 kubelet[2003]: I1029 05:38:08.366480 2003 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 05:38:08.367628 kubelet[2003]: I1029 05:38:08.366730 2003 reconciler.go:26] "Reconciler: start to sync state" Oct 29 05:38:08.372934 kubelet[2003]: I1029 05:38:08.372089 2003 factory.go:223] Registration of the systemd container factory successfully Oct 29 05:38:08.372934 kubelet[2003]: I1029 05:38:08.372289 2003 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 05:38:08.378375 kubelet[2003]: E1029 05:38:08.378335 2003 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 05:38:08.392811 kubelet[2003]: I1029 05:38:08.392761 2003 factory.go:223] Registration of the containerd container factory successfully Oct 29 05:38:08.414144 kubelet[2003]: I1029 05:38:08.414086 2003 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 29 05:38:08.418521 kubelet[2003]: I1029 05:38:08.418490 2003 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 29 05:38:08.418733 kubelet[2003]: I1029 05:38:08.418709 2003 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 29 05:38:08.419089 kubelet[2003]: I1029 05:38:08.419057 2003 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 05:38:08.419258 kubelet[2003]: I1029 05:38:08.419234 2003 kubelet.go:2436] "Starting kubelet main sync loop" Oct 29 05:38:08.419541 kubelet[2003]: E1029 05:38:08.419498 2003 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 29 05:38:08.496360 kubelet[2003]: I1029 05:38:08.496323 2003 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 05:38:08.496625 kubelet[2003]: I1029 05:38:08.496585 2003 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 05:38:08.496783 kubelet[2003]: I1029 05:38:08.496761 2003 state_mem.go:36] "Initialized new in-memory state store" Oct 29 05:38:08.497194 kubelet[2003]: I1029 05:38:08.497163 2003 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 29 05:38:08.497364 kubelet[2003]: I1029 05:38:08.497318 2003 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 29 05:38:08.497533 kubelet[2003]: I1029 05:38:08.497483 2003 policy_none.go:49] "None policy: Start" Oct 29 05:38:08.497672 kubelet[2003]: I1029 05:38:08.497648 2003 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 05:38:08.497851 kubelet[2003]: I1029 05:38:08.497829 2003 state_mem.go:35] "Initializing new in-memory state store" Oct 29 05:38:08.498145 kubelet[2003]: I1029 05:38:08.498120 2003 state_mem.go:75] "Updated machine memory state" Oct 29 05:38:08.509952 kubelet[2003]: E1029 05:38:08.509896 2003 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 29 05:38:08.522026 kernel: kauditd_printk_skb: 274 callbacks suppressed Oct 29 05:38:08.522219 kernel: audit: type=1400 audit(1761716288.509:845): avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:08.509000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:08.523589 kubelet[2003]: E1029 05:38:08.520238 2003 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 29 05:38:08.523925 kubelet[2003]: E1029 05:38:08.523864 2003 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 29 05:38:08.525517 kubelet[2003]: I1029 05:38:08.524443 2003 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 05:38:08.525840 kubelet[2003]: I1029 05:38:08.525667 2003 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 05:38:08.509000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:38:08.531406 kubelet[2003]: I1029 05:38:08.531382 2003 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 05:38:08.509000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010faba0 a1=c00110d710 a2=c0010fab70 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:08.535842 kubelet[2003]: E1029 05:38:08.535807 2003 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 05:38:08.540551 kernel: audit: type=1401 audit(1761716288.509:845): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 05:38:08.540636 kernel: audit: type=1300 audit(1761716288.509:845): arch=c000003e syscall=188 success=no exit=-22 a0=c0010faba0 a1=c00110d710 a2=c0010fab70 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:08.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:38:08.549948 kernel: audit: type=1327 audit(1761716288.509:845): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 05:38:08.687883 kubelet[2003]: I1029 05:38:08.687738 2003 kubelet_node_status.go:75] "Attempting to register node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.704372 kubelet[2003]: I1029 05:38:08.704324 2003 kubelet_node_status.go:124] "Node was previously registered" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.704531 kubelet[2003]: I1029 05:38:08.704473 2003 kubelet_node_status.go:78] "Successfully registered node" node="srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.721677 kubelet[2003]: I1029 05:38:08.721635 2003 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.721962 kubelet[2003]: I1029 05:38:08.721642 2003 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.722234 kubelet[2003]: I1029 05:38:08.722202 2003 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.731793 kubelet[2003]: I1029 05:38:08.731680 2003 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 29 05:38:08.733069 kubelet[2003]: I1029 05:38:08.733029 2003 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 29 05:38:08.738858 kubelet[2003]: I1029 05:38:08.738811 2003 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 29 05:38:08.738985 kubelet[2003]: E1029 05:38:08.738881 2003 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784089 kubelet[2003]: I1029 05:38:08.784023 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-ca-certs\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784315 kubelet[2003]: I1029 05:38:08.784092 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-flexvolume-dir\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784315 kubelet[2003]: I1029 05:38:08.784137 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-k8s-certs\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784315 kubelet[2003]: I1029 05:38:08.784167 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784315 kubelet[2003]: I1029 05:38:08.784197 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-k8s-certs\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784315 kubelet[2003]: I1029 05:38:08.784226 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bdc4db6de416b0681155eff29806db8-usr-share-ca-certificates\") pod \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" (UID: \"6bdc4db6de416b0681155eff29806db8\") " pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784641 kubelet[2003]: I1029 05:38:08.784254 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-ca-certs\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784641 kubelet[2003]: I1029 05:38:08.784282 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/21b3fd6b5460449163d469528b14a43f-kubeconfig\") pod \"kube-controller-manager-srv-gd80c.gb1.brightbox.com\" (UID: \"21b3fd6b5460449163d469528b14a43f\") " pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:08.784641 kubelet[2003]: I1029 05:38:08.784313 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a48ab14de85a9c043adbe5053fe5e0a8-kubeconfig\") pod \"kube-scheduler-srv-gd80c.gb1.brightbox.com\" (UID: \"a48ab14de85a9c043adbe5053fe5e0a8\") " pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:09.286598 kubelet[2003]: I1029 05:38:09.286519 2003 apiserver.go:52] "Watching apiserver" Oct 29 05:38:09.367295 kubelet[2003]: I1029 05:38:09.367198 2003 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 05:38:09.384790 kubelet[2003]: I1029 05:38:09.384679 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" podStartSLOduration=3.384617824 podStartE2EDuration="3.384617824s" podCreationTimestamp="2025-10-29 05:38:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:38:09.369950477 +0000 UTC m=+1.268604013" watchObservedRunningTime="2025-10-29 05:38:09.384617824 +0000 UTC m=+1.283271347" Oct 29 05:38:09.401683 kubelet[2003]: I1029 05:38:09.401572 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-gd80c.gb1.brightbox.com" podStartSLOduration=1.401532913 podStartE2EDuration="1.401532913s" podCreationTimestamp="2025-10-29 05:38:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:38:09.385762448 +0000 UTC m=+1.284415987" watchObservedRunningTime="2025-10-29 05:38:09.401532913 +0000 UTC m=+1.300186442" Oct 29 05:38:09.420526 kubelet[2003]: I1029 05:38:09.420399 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-gd80c.gb1.brightbox.com" podStartSLOduration=1.420378656 podStartE2EDuration="1.420378656s" podCreationTimestamp="2025-10-29 05:38:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:38:09.402009245 +0000 UTC m=+1.300662786" watchObservedRunningTime="2025-10-29 05:38:09.420378656 +0000 UTC m=+1.319032192" Oct 29 05:38:09.460368 kubelet[2003]: I1029 05:38:09.460297 2003 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:09.471425 kubelet[2003]: I1029 05:38:09.471376 2003 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 29 05:38:09.471637 kubelet[2003]: E1029 05:38:09.471479 2003 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-gd80c.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-gd80c.gb1.brightbox.com" Oct 29 05:38:09.615000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 29 05:38:09.623965 kernel: audit: type=1400 audit(1761716289.615:846): avc: denied { watch } for pid=1872 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 29 05:38:09.615000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cff780 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:09.632939 kernel: audit: type=1300 audit(1761716289.615:846): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cff780 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:38:09.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:09.643164 kernel: audit: type=1327 audit(1761716289.615:846): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:38:10.394335 kubelet[2003]: I1029 05:38:10.394261 2003 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 29 05:38:10.395637 env[1199]: time="2025-10-29T05:38:10.395557368Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 29 05:38:10.396713 kubelet[2003]: I1029 05:38:10.396428 2003 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 29 05:38:11.367475 systemd[1]: Created slice kubepods-besteffort-pod5ee42622_efc7_4447_948e_7b39a91f6c44.slice. Oct 29 05:38:11.401091 kubelet[2003]: I1029 05:38:11.401040 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5ee42622-efc7-4447-948e-7b39a91f6c44-kube-proxy\") pod \"kube-proxy-csqgm\" (UID: \"5ee42622-efc7-4447-948e-7b39a91f6c44\") " pod="kube-system/kube-proxy-csqgm" Oct 29 05:38:11.401767 kubelet[2003]: I1029 05:38:11.401737 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5ee42622-efc7-4447-948e-7b39a91f6c44-xtables-lock\") pod \"kube-proxy-csqgm\" (UID: \"5ee42622-efc7-4447-948e-7b39a91f6c44\") " pod="kube-system/kube-proxy-csqgm" Oct 29 05:38:11.401971 kubelet[2003]: I1029 05:38:11.401934 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vqst\" (UniqueName: \"kubernetes.io/projected/5ee42622-efc7-4447-948e-7b39a91f6c44-kube-api-access-2vqst\") pod \"kube-proxy-csqgm\" (UID: \"5ee42622-efc7-4447-948e-7b39a91f6c44\") " pod="kube-system/kube-proxy-csqgm" Oct 29 05:38:11.402154 kubelet[2003]: I1029 05:38:11.402115 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5ee42622-efc7-4447-948e-7b39a91f6c44-lib-modules\") pod \"kube-proxy-csqgm\" (UID: \"5ee42622-efc7-4447-948e-7b39a91f6c44\") " pod="kube-system/kube-proxy-csqgm" Oct 29 05:38:11.512658 kubelet[2003]: I1029 05:38:11.512596 2003 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 29 05:38:11.628461 systemd[1]: Created slice kubepods-besteffort-pod7936949b_d06c_4767_bdc0_e6759d092836.slice. Oct 29 05:38:11.635066 kubelet[2003]: I1029 05:38:11.635012 2003 status_manager.go:895] "Failed to get status for pod" podUID="7936949b-d06c-4767-bdc0-e6759d092836" pod="tigera-operator/tigera-operator-7dcd859c48-f6ln5" err="pods \"tigera-operator-7dcd859c48-f6ln5\" is forbidden: User \"system:node:srv-gd80c.gb1.brightbox.com\" cannot get resource \"pods\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-gd80c.gb1.brightbox.com' and this object" Oct 29 05:38:11.676952 env[1199]: time="2025-10-29T05:38:11.676649449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-csqgm,Uid:5ee42622-efc7-4447-948e-7b39a91f6c44,Namespace:kube-system,Attempt:0,}" Oct 29 05:38:11.703697 env[1199]: time="2025-10-29T05:38:11.703573946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:11.703697 env[1199]: time="2025-10-29T05:38:11.703653002Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:11.704142 env[1199]: time="2025-10-29T05:38:11.703671698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:11.704680 kubelet[2003]: I1029 05:38:11.704509 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gg5bk\" (UniqueName: \"kubernetes.io/projected/7936949b-d06c-4767-bdc0-e6759d092836-kube-api-access-gg5bk\") pod \"tigera-operator-7dcd859c48-f6ln5\" (UID: \"7936949b-d06c-4767-bdc0-e6759d092836\") " pod="tigera-operator/tigera-operator-7dcd859c48-f6ln5" Oct 29 05:38:11.704680 kubelet[2003]: I1029 05:38:11.704573 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7936949b-d06c-4767-bdc0-e6759d092836-var-lib-calico\") pod \"tigera-operator-7dcd859c48-f6ln5\" (UID: \"7936949b-d06c-4767-bdc0-e6759d092836\") " pod="tigera-operator/tigera-operator-7dcd859c48-f6ln5" Oct 29 05:38:11.705179 env[1199]: time="2025-10-29T05:38:11.705113312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef pid=2061 runtime=io.containerd.runc.v2 Oct 29 05:38:11.730705 systemd[1]: Started cri-containerd-1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef.scope. Oct 29 05:38:11.742082 systemd[1]: run-containerd-runc-k8s.io-1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef-runc.qS0fru.mount: Deactivated successfully. Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781652 kernel: audit: type=1400 audit(1761716291.770:847): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781726 kernel: audit: type=1400 audit(1761716291.770:848): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781945 kernel: audit: type=1400 audit(1761716291.770:849): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.770000 audit: BPF prog-id=109 op=LOAD Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2061 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161376665613862313431613836643564323230613563616664396266 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2061 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161376665613862313431613836643564323230613563616664396266 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.776000 audit: BPF prog-id=110 op=LOAD Oct 29 05:38:11.776000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00037f440 items=0 ppid=2061 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161376665613862313431613836643564323230613563616664396266 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.781000 audit: BPF prog-id=111 op=LOAD Oct 29 05:38:11.781000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00037f488 items=0 ppid=2061 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161376665613862313431613836643564323230613563616664396266 Oct 29 05:38:11.786000 audit: BPF prog-id=111 op=UNLOAD Oct 29 05:38:11.786000 audit: BPF prog-id=110 op=UNLOAD Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.786000 audit: BPF prog-id=112 op=LOAD Oct 29 05:38:11.786000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00037f898 items=0 ppid=2061 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161376665613862313431613836643564323230613563616664396266 Oct 29 05:38:11.808402 env[1199]: time="2025-10-29T05:38:11.808340712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-csqgm,Uid:5ee42622-efc7-4447-948e-7b39a91f6c44,Namespace:kube-system,Attempt:0,} returns sandbox id \"1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef\"" Oct 29 05:38:11.823497 env[1199]: time="2025-10-29T05:38:11.823422327Z" level=info msg="CreateContainer within sandbox \"1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 29 05:38:11.849996 env[1199]: time="2025-10-29T05:38:11.849886972Z" level=info msg="CreateContainer within sandbox \"1a7fea8b141a86d5d220a5cafd9bfc4e3381fbfa93e6682d2b13dbd916183cef\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2477294e9434bc2d0ad3db9cfeaad54213a80a17b92286f1acd9368bdbe83790\"" Oct 29 05:38:11.852800 env[1199]: time="2025-10-29T05:38:11.852327662Z" level=info msg="StartContainer for \"2477294e9434bc2d0ad3db9cfeaad54213a80a17b92286f1acd9368bdbe83790\"" Oct 29 05:38:11.877799 systemd[1]: Started cri-containerd-2477294e9434bc2d0ad3db9cfeaad54213a80a17b92286f1acd9368bdbe83790.scope. Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f715ef86a08 items=0 ppid=2061 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373732393465393433346263326430616433646239636665616164 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit: BPF prog-id=113 op=LOAD Oct 29 05:38:11.910000 audit[2101]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fbf68 items=0 ppid=2061 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373732393465393433346263326430616433646239636665616164 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.910000 audit: BPF prog-id=114 op=LOAD Oct 29 05:38:11.910000 audit[2101]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002fbfb8 items=0 ppid=2061 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373732393465393433346263326430616433646239636665616164 Oct 29 05:38:11.911000 audit: BPF prog-id=114 op=UNLOAD Oct 29 05:38:11.911000 audit: BPF prog-id=113 op=UNLOAD Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { perfmon } for pid=2101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit[2101]: AVC avc: denied { bpf } for pid=2101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:11.911000 audit: BPF prog-id=115 op=LOAD Oct 29 05:38:11.911000 audit[2101]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ec048 items=0 ppid=2061 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234373732393465393433346263326430616433646239636665616164 Oct 29 05:38:11.935534 env[1199]: time="2025-10-29T05:38:11.935463687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-f6ln5,Uid:7936949b-d06c-4767-bdc0-e6759d092836,Namespace:tigera-operator,Attempt:0,}" Oct 29 05:38:11.938852 env[1199]: time="2025-10-29T05:38:11.938802872Z" level=info msg="StartContainer for \"2477294e9434bc2d0ad3db9cfeaad54213a80a17b92286f1acd9368bdbe83790\" returns successfully" Oct 29 05:38:11.956667 env[1199]: time="2025-10-29T05:38:11.956572685Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:11.956932 env[1199]: time="2025-10-29T05:38:11.956679973Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:11.956932 env[1199]: time="2025-10-29T05:38:11.956751550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:11.957099 env[1199]: time="2025-10-29T05:38:11.957007299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b945a7577b943b3040f0259ce88c80b70bf0e85ae83e407c1678c852fe54c24 pid=2132 runtime=io.containerd.runc.v2 Oct 29 05:38:11.980685 systemd[1]: Started cri-containerd-8b945a7577b943b3040f0259ce88c80b70bf0e85ae83e407c1678c852fe54c24.scope. Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.020000 audit: BPF prog-id=116 op=LOAD Oct 29 05:38:12.020000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.020000 audit[2142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2132 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393435613735373762393433623330343066303235396365383863 Oct 29 05:38:12.020000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.020000 audit[2142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2132 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393435613735373762393433623330343066303235396365383863 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit: BPF prog-id=117 op=LOAD Oct 29 05:38:12.021000 audit[2142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00029a6e0 items=0 ppid=2132 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393435613735373762393433623330343066303235396365383863 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit: BPF prog-id=118 op=LOAD Oct 29 05:38:12.021000 audit[2142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00029a728 items=0 ppid=2132 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393435613735373762393433623330343066303235396365383863 Oct 29 05:38:12.021000 audit: BPF prog-id=118 op=UNLOAD Oct 29 05:38:12.021000 audit: BPF prog-id=117 op=UNLOAD Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { perfmon } for pid=2142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit[2142]: AVC avc: denied { bpf } for pid=2142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:12.021000 audit: BPF prog-id=119 op=LOAD Oct 29 05:38:12.021000 audit[2142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00029ab38 items=0 ppid=2132 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393435613735373762393433623330343066303235396365383863 Oct 29 05:38:12.073034 env[1199]: time="2025-10-29T05:38:12.072963564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-f6ln5,Uid:7936949b-d06c-4767-bdc0-e6759d092836,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8b945a7577b943b3040f0259ce88c80b70bf0e85ae83e407c1678c852fe54c24\"" Oct 29 05:38:12.078522 env[1199]: time="2025-10-29T05:38:12.076549157Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 29 05:38:12.443000 audit[2203]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.443000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe57dcd2d0 a2=0 a3=7ffe57dcd2bc items=0 ppid=2112 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 05:38:12.445000 audit[2202]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.445000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5f48f2c0 a2=0 a3=7fff5f48f2ac items=0 ppid=2112 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 05:38:12.447000 audit[2207]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.447000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c51ca10 a2=0 a3=7ffd7c51c9fc items=0 ppid=2112 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 05:38:12.452000 audit[2208]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.452000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7619afb0 a2=0 a3=7ffd7619af9c items=0 ppid=2112 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 05:38:12.453000 audit[2209]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.453000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfc9f5ec0 a2=0 a3=7ffcfc9f5eac items=0 ppid=2112 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 05:38:12.455000 audit[2210]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.455000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbabf53a0 a2=0 a3=7fffbabf538c items=0 ppid=2112 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 05:38:12.496573 kubelet[2003]: I1029 05:38:12.496492 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-csqgm" podStartSLOduration=1.496473213 podStartE2EDuration="1.496473213s" podCreationTimestamp="2025-10-29 05:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:38:12.495224596 +0000 UTC m=+4.393878136" watchObservedRunningTime="2025-10-29 05:38:12.496473213 +0000 UTC m=+4.395126754" Oct 29 05:38:12.547000 audit[2212]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.547000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff359335b0 a2=0 a3=7fff3593359c items=0 ppid=2112 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 05:38:12.552000 audit[2214]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.552000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc382a9a10 a2=0 a3=7ffc382a99fc items=0 ppid=2112 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 29 05:38:12.559000 audit[2217]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.559000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd1638dd20 a2=0 a3=7ffd1638dd0c items=0 ppid=2112 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 29 05:38:12.561000 audit[2218]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.561000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc9e7ebd0 a2=0 a3=7ffcc9e7ebbc items=0 ppid=2112 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 05:38:12.565000 audit[2220]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.565000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2d36e3a0 a2=0 a3=7fff2d36e38c items=0 ppid=2112 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 05:38:12.567000 audit[2221]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.567000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0a2c0fd0 a2=0 a3=7ffc0a2c0fbc items=0 ppid=2112 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 05:38:12.571000 audit[2223]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.571000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd894c8480 a2=0 a3=7ffd894c846c items=0 ppid=2112 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 05:38:12.577000 audit[2226]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.577000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffccbe5dc70 a2=0 a3=7ffccbe5dc5c items=0 ppid=2112 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 29 05:38:12.579000 audit[2227]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.579000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35e6d700 a2=0 a3=7ffe35e6d6ec items=0 ppid=2112 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 05:38:12.587000 audit[2229]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.587000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0aea2b50 a2=0 a3=7fff0aea2b3c items=0 ppid=2112 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 05:38:12.590000 audit[2230]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.590000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9edb5900 a2=0 a3=7ffc9edb58ec items=0 ppid=2112 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 05:38:12.594000 audit[2232]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.594000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb6077310 a2=0 a3=7ffdb60772fc items=0 ppid=2112 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 05:38:12.599000 audit[2235]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.599000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6afe8fc0 a2=0 a3=7fff6afe8fac items=0 ppid=2112 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 05:38:12.607000 audit[2238]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.607000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda8cf12a0 a2=0 a3=7ffda8cf128c items=0 ppid=2112 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 05:38:12.610000 audit[2239]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.610000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe74764190 a2=0 a3=7ffe7476417c items=0 ppid=2112 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 05:38:12.614000 audit[2241]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.614000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff9710ed70 a2=0 a3=7fff9710ed5c items=0 ppid=2112 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 05:38:12.620000 audit[2244]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.620000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffca88890 a2=0 a3=7ffffca8887c items=0 ppid=2112 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 05:38:12.622000 audit[2245]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.622000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbcbb1450 a2=0 a3=7ffcbcbb143c items=0 ppid=2112 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 05:38:12.626000 audit[2247]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 05:38:12.626000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd2afcf740 a2=0 a3=7ffd2afcf72c items=0 ppid=2112 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 05:38:12.672000 audit[2254]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:12.672000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff407685c0 a2=0 a3=7fff407685ac items=0 ppid=2112 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:12.683000 audit[2254]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:12.683000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff407685c0 a2=0 a3=7fff407685ac items=0 ppid=2112 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:12.686000 audit[2259]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.686000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd74798260 a2=0 a3=7ffd7479824c items=0 ppid=2112 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 05:38:12.693000 audit[2261]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.693000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4c3afc40 a2=0 a3=7ffc4c3afc2c items=0 ppid=2112 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 29 05:38:12.699000 audit[2264]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.699000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb59c1060 a2=0 a3=7ffeb59c104c items=0 ppid=2112 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 29 05:38:12.701000 audit[2265]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.701000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcad31e50 a2=0 a3=7ffdcad31e3c items=0 ppid=2112 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 05:38:12.705000 audit[2267]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.705000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc29b40080 a2=0 a3=7ffc29b4006c items=0 ppid=2112 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 05:38:12.707000 audit[2268]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.707000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8cfcba50 a2=0 a3=7ffd8cfcba3c items=0 ppid=2112 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 05:38:12.711000 audit[2270]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.711000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff79935940 a2=0 a3=7fff7993592c items=0 ppid=2112 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 29 05:38:12.717000 audit[2273]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.717000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff4ae2bb40 a2=0 a3=7fff4ae2bb2c items=0 ppid=2112 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 05:38:12.719000 audit[2274]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.719000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe97679360 a2=0 a3=7ffe9767934c items=0 ppid=2112 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 05:38:12.723000 audit[2276]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.723000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7ac69f90 a2=0 a3=7fff7ac69f7c items=0 ppid=2112 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 05:38:12.724000 audit[2277]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.724000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1fa45ed0 a2=0 a3=7fff1fa45ebc items=0 ppid=2112 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 05:38:12.729000 audit[2279]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.729000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe79db600 a2=0 a3=7fffe79db5ec items=0 ppid=2112 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 05:38:12.734000 audit[2282]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.734000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8e111f00 a2=0 a3=7ffc8e111eec items=0 ppid=2112 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 05:38:12.740000 audit[2285]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.740000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd45a1d910 a2=0 a3=7ffd45a1d8fc items=0 ppid=2112 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 29 05:38:12.742000 audit[2286]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.742000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec46bb490 a2=0 a3=7ffec46bb47c items=0 ppid=2112 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 05:38:12.746000 audit[2288]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.746000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff5bbfa7c0 a2=0 a3=7fff5bbfa7ac items=0 ppid=2112 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 05:38:12.752000 audit[2291]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.752000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc89a31460 a2=0 a3=7ffc89a3144c items=0 ppid=2112 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 05:38:12.754000 audit[2292]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.754000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc49f4c090 a2=0 a3=7ffc49f4c07c items=0 ppid=2112 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 05:38:12.757000 audit[2294]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.757000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfe27d5b0 a2=0 a3=7ffdfe27d59c items=0 ppid=2112 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 05:38:12.759000 audit[2295]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.759000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfa7ae760 a2=0 a3=7ffdfa7ae74c items=0 ppid=2112 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 05:38:12.763000 audit[2297]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.763000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5f103ba0 a2=0 a3=7ffe5f103b8c items=0 ppid=2112 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 05:38:12.769000 audit[2300]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 05:38:12.769000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd92b5360 a2=0 a3=7ffcd92b534c items=0 ppid=2112 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 05:38:12.774000 audit[2302]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 05:38:12.774000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd26eb21a0 a2=0 a3=7ffd26eb218c items=0 ppid=2112 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.774000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:12.775000 audit[2302]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 05:38:12.775000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd26eb21a0 a2=0 a3=7ffd26eb218c items=0 ppid=2112 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:12.775000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:14.556366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2918873923.mount: Deactivated successfully. Oct 29 05:38:15.941277 env[1199]: time="2025-10-29T05:38:15.941170596Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:15.944166 env[1199]: time="2025-10-29T05:38:15.944121661Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:15.947532 env[1199]: time="2025-10-29T05:38:15.947487240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:15.950280 env[1199]: time="2025-10-29T05:38:15.950203798Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:15.952116 env[1199]: time="2025-10-29T05:38:15.951181098Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 29 05:38:15.959664 env[1199]: time="2025-10-29T05:38:15.959621277Z" level=info msg="CreateContainer within sandbox \"8b945a7577b943b3040f0259ce88c80b70bf0e85ae83e407c1678c852fe54c24\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 29 05:38:15.975117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2776345584.mount: Deactivated successfully. Oct 29 05:38:15.984350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240999014.mount: Deactivated successfully. Oct 29 05:38:15.988777 env[1199]: time="2025-10-29T05:38:15.988717572Z" level=info msg="CreateContainer within sandbox \"8b945a7577b943b3040f0259ce88c80b70bf0e85ae83e407c1678c852fe54c24\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7098db5c8bd549f4ee1e3d24fe805d9be2e82b061c24139e815ba098961da9b1\"" Oct 29 05:38:15.991719 env[1199]: time="2025-10-29T05:38:15.991604896Z" level=info msg="StartContainer for \"7098db5c8bd549f4ee1e3d24fe805d9be2e82b061c24139e815ba098961da9b1\"" Oct 29 05:38:16.027140 systemd[1]: Started cri-containerd-7098db5c8bd549f4ee1e3d24fe805d9be2e82b061c24139e815ba098961da9b1.scope. Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.068557 kernel: kauditd_printk_skb: 307 callbacks suppressed Oct 29 05:38:16.068719 kernel: audit: type=1400 audit(1761716296.061:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073840 kernel: audit: type=1400 audit(1761716296.061:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.084148 kernel: audit: type=1400 audit(1761716296.061:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.084246 kernel: audit: type=1400 audit(1761716296.061:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.084309 kernel: audit: type=1400 audit(1761716296.061:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.101730 kernel: audit: type=1400 audit(1761716296.061:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.101937 kernel: audit: type=1400 audit(1761716296.061:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.102008 kernel: audit: type=1400 audit(1761716296.061:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.118685 kernel: audit: type=1400 audit(1761716296.061:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.118846 kernel: audit: type=1400 audit(1761716296.068:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.068000 audit: BPF prog-id=120 op=LOAD Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2132 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:16.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393864623563386264353439663465653165336432346665383035 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2132 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:16.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393864623563386264353439663465653165336432346665383035 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.073000 audit: BPF prog-id=121 op=LOAD Oct 29 05:38:16.073000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000209500 items=0 ppid=2132 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:16.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393864623563386264353439663465653165336432346665383035 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.078000 audit: BPF prog-id=122 op=LOAD Oct 29 05:38:16.078000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000209548 items=0 ppid=2132 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:16.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393864623563386264353439663465653165336432346665383035 Oct 29 05:38:16.088000 audit: BPF prog-id=122 op=UNLOAD Oct 29 05:38:16.088000 audit: BPF prog-id=121 op=UNLOAD Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:16.088000 audit: BPF prog-id=123 op=LOAD Oct 29 05:38:16.088000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000209958 items=0 ppid=2132 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:16.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393864623563386264353439663465653165336432346665383035 Oct 29 05:38:16.143545 env[1199]: time="2025-10-29T05:38:16.143486159Z" level=info msg="StartContainer for \"7098db5c8bd549f4ee1e3d24fe805d9be2e82b061c24139e815ba098961da9b1\" returns successfully" Oct 29 05:38:21.795000 audit[1360]: USER_END pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:38:21.796017 sudo[1360]: pam_unix(sudo:session): session closed for user root Oct 29 05:38:21.797844 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 29 05:38:21.797992 kernel: audit: type=1106 audit(1761716301.795:958): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:38:21.797000 audit[1360]: CRED_DISP pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:38:21.823384 kernel: audit: type=1104 audit(1761716301.797:959): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 05:38:21.963226 sshd[1357]: pam_unix(sshd:session): session closed for user core Oct 29 05:38:21.968000 audit[1357]: USER_END pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:38:21.978935 kernel: audit: type=1106 audit(1761716301.968:960): pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:38:21.968000 audit[1357]: CRED_DISP pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:38:21.980750 systemd[1]: sshd@6-10.244.11.46:22-147.75.109.163:60032.service: Deactivated successfully. Oct 29 05:38:21.984380 systemd[1]: session-7.scope: Deactivated successfully. Oct 29 05:38:21.985028 systemd[1]: session-7.scope: Consumed 7.220s CPU time. Oct 29 05:38:21.987294 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. Oct 29 05:38:21.987949 kernel: audit: type=1104 audit(1761716301.968:961): pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:38:21.989384 systemd-logind[1187]: Removed session 7. Oct 29 05:38:21.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.46:22-147.75.109.163:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:38:21.999029 kernel: audit: type=1131 audit(1761716301.980:962): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.46:22-147.75.109.163:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:38:23.439000 audit[2385]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.456504 kernel: audit: type=1325 audit(1761716303.439:963): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.456705 kernel: audit: type=1300 audit(1761716303.439:963): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcb00872f0 a2=0 a3=7ffcb00872dc items=0 ppid=2112 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.439000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcb00872f0 a2=0 a3=7ffcb00872dc items=0 ppid=2112 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:23.467063 kernel: audit: type=1327 audit(1761716303.439:963): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:23.468000 audit[2385]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.474940 kernel: audit: type=1325 audit(1761716303.468:964): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.468000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb00872f0 a2=0 a3=0 items=0 ppid=2112 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.484976 kernel: audit: type=1300 audit(1761716303.468:964): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb00872f0 a2=0 a3=0 items=0 ppid=2112 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:23.531000 audit[2387]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.531000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff5b795070 a2=0 a3=7fff5b79505c items=0 ppid=2112 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:23.536000 audit[2387]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:23.536000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff5b795070 a2=0 a3=0 items=0 ppid=2112 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:23.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.643519 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 29 05:38:27.643972 kernel: audit: type=1325 audit(1761716307.636:967): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.636000 audit[2389]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.636000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe093d7a70 a2=0 a3=7ffe093d7a5c items=0 ppid=2112 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.653270 kernel: audit: type=1300 audit(1761716307.636:967): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe093d7a70 a2=0 a3=7ffe093d7a5c items=0 ppid=2112 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.658999 kernel: audit: type=1327 audit(1761716307.636:967): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.658000 audit[2389]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.666941 kernel: audit: type=1325 audit(1761716307.658:968): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.658000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe093d7a70 a2=0 a3=0 items=0 ppid=2112 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.676990 kernel: audit: type=1300 audit(1761716307.658:968): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe093d7a70 a2=0 a3=0 items=0 ppid=2112 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.681947 kernel: audit: type=1327 audit(1761716307.658:968): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.695000 audit[2391]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.709633 kernel: audit: type=1325 audit(1761716307.695:969): table=filter:95 family=2 entries=19 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.709759 kernel: audit: type=1300 audit(1761716307.695:969): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe01a92bb0 a2=0 a3=7ffe01a92b9c items=0 ppid=2112 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.695000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe01a92bb0 a2=0 a3=7ffe01a92b9c items=0 ppid=2112 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.749951 kernel: audit: type=1327 audit(1761716307.695:969): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:27.750000 audit[2391]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.750000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe01a92bb0 a2=0 a3=0 items=0 ppid=2112 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:27.759932 kernel: audit: type=1325 audit(1761716307.750:970): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:27.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:28.777000 audit[2397]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:28.777000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffecddf0a40 a2=0 a3=7ffecddf0a2c items=0 ppid=2112 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:28.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:28.783000 audit[2397]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:28.783000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffecddf0a40 a2=0 a3=0 items=0 ppid=2112 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:28.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:29.800000 audit[2399]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:29.800000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd28038a80 a2=0 a3=7ffd28038a6c items=0 ppid=2112 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:29.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:29.808000 audit[2399]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:29.808000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd28038a80 a2=0 a3=0 items=0 ppid=2112 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:29.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:29.847798 kubelet[2003]: I1029 05:38:29.847609 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-f6ln5" podStartSLOduration=14.96920051 podStartE2EDuration="18.847512011s" podCreationTimestamp="2025-10-29 05:38:11 +0000 UTC" firstStartedPulling="2025-10-29 05:38:12.075224268 +0000 UTC m=+3.973877792" lastFinishedPulling="2025-10-29 05:38:15.953535764 +0000 UTC m=+7.852189293" observedRunningTime="2025-10-29 05:38:16.502793068 +0000 UTC m=+8.401446598" watchObservedRunningTime="2025-10-29 05:38:29.847512011 +0000 UTC m=+21.746165552" Oct 29 05:38:29.870902 systemd[1]: Created slice kubepods-besteffort-pod53c4a77a_8bba_4a5b_956b_69795e4fae85.slice. Oct 29 05:38:29.938482 kubelet[2003]: I1029 05:38:29.938425 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/53c4a77a-8bba-4a5b-956b-69795e4fae85-typha-certs\") pod \"calico-typha-677789cd7b-sqhvz\" (UID: \"53c4a77a-8bba-4a5b-956b-69795e4fae85\") " pod="calico-system/calico-typha-677789cd7b-sqhvz" Oct 29 05:38:29.938743 kubelet[2003]: I1029 05:38:29.938511 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rps54\" (UniqueName: \"kubernetes.io/projected/53c4a77a-8bba-4a5b-956b-69795e4fae85-kube-api-access-rps54\") pod \"calico-typha-677789cd7b-sqhvz\" (UID: \"53c4a77a-8bba-4a5b-956b-69795e4fae85\") " pod="calico-system/calico-typha-677789cd7b-sqhvz" Oct 29 05:38:29.938743 kubelet[2003]: I1029 05:38:29.938551 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53c4a77a-8bba-4a5b-956b-69795e4fae85-tigera-ca-bundle\") pod \"calico-typha-677789cd7b-sqhvz\" (UID: \"53c4a77a-8bba-4a5b-956b-69795e4fae85\") " pod="calico-system/calico-typha-677789cd7b-sqhvz" Oct 29 05:38:30.111343 systemd[1]: Created slice kubepods-besteffort-pod9d828122_1b59_4313_a7c3_4f8e849fc417.slice. Oct 29 05:38:30.141194 kubelet[2003]: I1029 05:38:30.141136 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-cni-bin-dir\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141194 kubelet[2003]: I1029 05:38:30.141197 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-flexvol-driver-host\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141515 kubelet[2003]: I1029 05:38:30.141228 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-lib-modules\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141515 kubelet[2003]: I1029 05:38:30.141257 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-var-lib-calico\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141515 kubelet[2003]: I1029 05:38:30.141286 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-var-run-calico\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141515 kubelet[2003]: I1029 05:38:30.141312 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-cni-net-dir\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141515 kubelet[2003]: I1029 05:38:30.141341 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-cni-log-dir\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141824 kubelet[2003]: I1029 05:38:30.141373 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9d828122-1b59-4313-a7c3-4f8e849fc417-node-certs\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141824 kubelet[2003]: I1029 05:38:30.141403 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lb76m\" (UniqueName: \"kubernetes.io/projected/9d828122-1b59-4313-a7c3-4f8e849fc417-kube-api-access-lb76m\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141824 kubelet[2003]: I1029 05:38:30.141450 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-policysync\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141824 kubelet[2003]: I1029 05:38:30.141481 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9d828122-1b59-4313-a7c3-4f8e849fc417-tigera-ca-bundle\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.141824 kubelet[2003]: I1029 05:38:30.141510 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9d828122-1b59-4313-a7c3-4f8e849fc417-xtables-lock\") pod \"calico-node-jl4v4\" (UID: \"9d828122-1b59-4313-a7c3-4f8e849fc417\") " pod="calico-system/calico-node-jl4v4" Oct 29 05:38:30.232774 env[1199]: time="2025-10-29T05:38:30.232677655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-677789cd7b-sqhvz,Uid:53c4a77a-8bba-4a5b-956b-69795e4fae85,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:30.255967 kubelet[2003]: E1029 05:38:30.253840 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.255967 kubelet[2003]: W1029 05:38:30.253884 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.255967 kubelet[2003]: E1029 05:38:30.253970 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.257333 kubelet[2003]: E1029 05:38:30.257297 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.257333 kubelet[2003]: W1029 05:38:30.257324 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.257530 kubelet[2003]: E1029 05:38:30.257367 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.257951 kubelet[2003]: E1029 05:38:30.257897 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.257951 kubelet[2003]: W1029 05:38:30.257945 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.257951 kubelet[2003]: E1029 05:38:30.257964 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.258555 kubelet[2003]: E1029 05:38:30.258527 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.258555 kubelet[2003]: W1029 05:38:30.258548 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.258703 kubelet[2003]: E1029 05:38:30.258565 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.259139 kubelet[2003]: E1029 05:38:30.259099 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.259250 kubelet[2003]: W1029 05:38:30.259120 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.259250 kubelet[2003]: E1029 05:38:30.259183 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.259788 kubelet[2003]: E1029 05:38:30.259758 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.259788 kubelet[2003]: W1029 05:38:30.259780 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.259956 kubelet[2003]: E1029 05:38:30.259797 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.260230 kubelet[2003]: E1029 05:38:30.260202 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.260230 kubelet[2003]: W1029 05:38:30.260222 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.260355 kubelet[2003]: E1029 05:38:30.260239 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.260641 kubelet[2003]: E1029 05:38:30.260615 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.260731 kubelet[2003]: W1029 05:38:30.260639 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.260731 kubelet[2003]: E1029 05:38:30.260682 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.261095 kubelet[2003]: E1029 05:38:30.261019 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.261095 kubelet[2003]: W1029 05:38:30.261039 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.261095 kubelet[2003]: E1029 05:38:30.261082 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.261489 kubelet[2003]: E1029 05:38:30.261460 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.261489 kubelet[2003]: W1029 05:38:30.261481 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.261649 kubelet[2003]: E1029 05:38:30.261500 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.262194 kubelet[2003]: E1029 05:38:30.262116 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.262194 kubelet[2003]: W1029 05:38:30.262173 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.262194 kubelet[2003]: E1029 05:38:30.262193 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.273450 kubelet[2003]: E1029 05:38:30.273406 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.273662 kubelet[2003]: W1029 05:38:30.273629 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.273830 kubelet[2003]: E1029 05:38:30.273801 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.274270 kubelet[2003]: E1029 05:38:30.274247 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.274389 kubelet[2003]: W1029 05:38:30.274363 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.274541 kubelet[2003]: E1029 05:38:30.274516 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.279203 kubelet[2003]: E1029 05:38:30.279173 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.279488 kubelet[2003]: W1029 05:38:30.279448 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.279704 kubelet[2003]: E1029 05:38:30.279665 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.291520 kubelet[2003]: E1029 05:38:30.291484 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.291837 kubelet[2003]: W1029 05:38:30.291805 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.292098 kubelet[2003]: E1029 05:38:30.292015 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.292557 kubelet[2003]: E1029 05:38:30.292534 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.292713 kubelet[2003]: W1029 05:38:30.292686 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.301694 env[1199]: time="2025-10-29T05:38:30.297460703Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:30.301694 env[1199]: time="2025-10-29T05:38:30.297539115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:30.301694 env[1199]: time="2025-10-29T05:38:30.297558016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:30.304611 kubelet[2003]: E1029 05:38:30.304580 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.306833 env[1199]: time="2025-10-29T05:38:30.305500245Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8abe5800918d516f383cf0bbf6b52521666e11c344be4cce1faf51af9556cfa3 pid=2426 runtime=io.containerd.runc.v2 Oct 29 05:38:30.324035 kubelet[2003]: E1029 05:38:30.302418 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:30.325860 kubelet[2003]: E1029 05:38:30.324542 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.326030 kubelet[2003]: W1029 05:38:30.326001 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.333394 kubelet[2003]: E1029 05:38:30.333352 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.334641 kubelet[2003]: E1029 05:38:30.334617 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.341014 kubelet[2003]: W1029 05:38:30.340960 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.341281 kubelet[2003]: E1029 05:38:30.341250 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.344048 kubelet[2003]: E1029 05:38:30.344020 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.344219 kubelet[2003]: W1029 05:38:30.344191 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.344359 kubelet[2003]: E1029 05:38:30.344333 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.345066 kubelet[2003]: E1029 05:38:30.344883 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.345066 kubelet[2003]: W1029 05:38:30.344902 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.345066 kubelet[2003]: E1029 05:38:30.344941 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.348146 kubelet[2003]: E1029 05:38:30.345386 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.348146 kubelet[2003]: W1029 05:38:30.345404 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.348146 kubelet[2003]: E1029 05:38:30.345421 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.348146 kubelet[2003]: E1029 05:38:30.345712 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.348146 kubelet[2003]: W1029 05:38:30.345727 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.348146 kubelet[2003]: E1029 05:38:30.345743 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.348788 kubelet[2003]: E1029 05:38:30.348605 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.348788 kubelet[2003]: W1029 05:38:30.348627 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.348788 kubelet[2003]: E1029 05:38:30.348646 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.349309 kubelet[2003]: E1029 05:38:30.349157 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.349309 kubelet[2003]: W1029 05:38:30.349176 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.349309 kubelet[2003]: E1029 05:38:30.349193 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.349656 kubelet[2003]: E1029 05:38:30.349634 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.349787 kubelet[2003]: W1029 05:38:30.349761 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.349921 kubelet[2003]: E1029 05:38:30.349883 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.350424 kubelet[2003]: E1029 05:38:30.350402 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.350568 kubelet[2003]: W1029 05:38:30.350543 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.350702 kubelet[2003]: E1029 05:38:30.350677 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.356146 kubelet[2003]: E1029 05:38:30.356101 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.356311 kubelet[2003]: W1029 05:38:30.356284 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.356468 kubelet[2003]: E1029 05:38:30.356435 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.358860 kubelet[2003]: E1029 05:38:30.358836 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.359030 kubelet[2003]: W1029 05:38:30.359003 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.359179 kubelet[2003]: E1029 05:38:30.359152 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.362426 kubelet[2003]: E1029 05:38:30.362340 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.362569 kubelet[2003]: W1029 05:38:30.362542 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.362711 kubelet[2003]: E1029 05:38:30.362685 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.369046 kubelet[2003]: E1029 05:38:30.368624 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.369046 kubelet[2003]: W1029 05:38:30.368647 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.369046 kubelet[2003]: E1029 05:38:30.368675 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.374352 kubelet[2003]: E1029 05:38:30.374113 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.374352 kubelet[2003]: W1029 05:38:30.374161 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.374352 kubelet[2003]: E1029 05:38:30.374193 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.375213 kubelet[2003]: E1029 05:38:30.375043 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.375213 kubelet[2003]: W1029 05:38:30.375062 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.375213 kubelet[2003]: E1029 05:38:30.375079 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.375979 kubelet[2003]: E1029 05:38:30.375729 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.375979 kubelet[2003]: W1029 05:38:30.375748 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.375979 kubelet[2003]: E1029 05:38:30.375764 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.382896 systemd[1]: Started cri-containerd-8abe5800918d516f383cf0bbf6b52521666e11c344be4cce1faf51af9556cfa3.scope. Oct 29 05:38:30.384923 kubelet[2003]: E1029 05:38:30.384338 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.384923 kubelet[2003]: W1029 05:38:30.384369 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.384923 kubelet[2003]: E1029 05:38:30.384398 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.384923 kubelet[2003]: E1029 05:38:30.384776 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.384923 kubelet[2003]: W1029 05:38:30.384791 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.384923 kubelet[2003]: E1029 05:38:30.384807 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.388713 kubelet[2003]: E1029 05:38:30.388219 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.388713 kubelet[2003]: W1029 05:38:30.388247 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.388713 kubelet[2003]: E1029 05:38:30.388271 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.388713 kubelet[2003]: E1029 05:38:30.388574 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.388713 kubelet[2003]: W1029 05:38:30.388588 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.388713 kubelet[2003]: E1029 05:38:30.388604 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.389637 kubelet[2003]: E1029 05:38:30.389461 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.389637 kubelet[2003]: W1029 05:38:30.389479 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.389637 kubelet[2003]: E1029 05:38:30.389500 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.390044 kubelet[2003]: E1029 05:38:30.390022 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.390174 kubelet[2003]: W1029 05:38:30.390147 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.390313 kubelet[2003]: E1029 05:38:30.390288 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.391218 kubelet[2003]: E1029 05:38:30.391195 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.391364 kubelet[2003]: W1029 05:38:30.391338 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.391487 kubelet[2003]: E1029 05:38:30.391462 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.391868 kubelet[2003]: E1029 05:38:30.391846 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.396406 kubelet[2003]: W1029 05:38:30.396375 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.396555 kubelet[2003]: E1029 05:38:30.396528 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.396990 kubelet[2003]: E1029 05:38:30.396968 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.397141 kubelet[2003]: W1029 05:38:30.397103 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.397278 kubelet[2003]: E1029 05:38:30.397253 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.397743 kubelet[2003]: E1029 05:38:30.397721 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.397876 kubelet[2003]: W1029 05:38:30.397851 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.400079 kubelet[2003]: E1029 05:38:30.400048 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.400328 kubelet[2003]: I1029 05:38:30.400293 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5092f51d-06fc-4dab-b0c4-32dc46cf7538-registration-dir\") pod \"csi-node-driver-5lk8x\" (UID: \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\") " pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:30.400757 kubelet[2003]: E1029 05:38:30.400712 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.400894 kubelet[2003]: W1029 05:38:30.400868 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.401083 kubelet[2003]: E1029 05:38:30.401058 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.401243 kubelet[2003]: I1029 05:38:30.401216 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5092f51d-06fc-4dab-b0c4-32dc46cf7538-kubelet-dir\") pod \"csi-node-driver-5lk8x\" (UID: \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\") " pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:30.401652 kubelet[2003]: E1029 05:38:30.401625 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.401652 kubelet[2003]: W1029 05:38:30.401649 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.401822 kubelet[2003]: E1029 05:38:30.401669 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.402016 kubelet[2003]: E1029 05:38:30.401984 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.402016 kubelet[2003]: W1029 05:38:30.402014 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.402210 kubelet[2003]: E1029 05:38:30.402032 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.402377 kubelet[2003]: E1029 05:38:30.402350 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.402377 kubelet[2003]: W1029 05:38:30.402369 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.402511 kubelet[2003]: E1029 05:38:30.402387 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.402511 kubelet[2003]: I1029 05:38:30.402422 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5092f51d-06fc-4dab-b0c4-32dc46cf7538-varrun\") pod \"csi-node-driver-5lk8x\" (UID: \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\") " pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:30.402748 kubelet[2003]: E1029 05:38:30.402721 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.402748 kubelet[2003]: W1029 05:38:30.402743 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.402940 kubelet[2003]: E1029 05:38:30.402761 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.403098 kubelet[2003]: I1029 05:38:30.403063 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k7gk4\" (UniqueName: \"kubernetes.io/projected/5092f51d-06fc-4dab-b0c4-32dc46cf7538-kube-api-access-k7gk4\") pod \"csi-node-driver-5lk8x\" (UID: \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\") " pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:30.404185 kubelet[2003]: E1029 05:38:30.404090 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.404185 kubelet[2003]: W1029 05:38:30.404132 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.404185 kubelet[2003]: E1029 05:38:30.404160 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.404462 kubelet[2003]: E1029 05:38:30.404437 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.404462 kubelet[2003]: W1029 05:38:30.404457 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.404609 kubelet[2003]: E1029 05:38:30.404474 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.404780 kubelet[2003]: E1029 05:38:30.404748 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.404780 kubelet[2003]: W1029 05:38:30.404773 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.404981 kubelet[2003]: E1029 05:38:30.404790 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.405107 kubelet[2003]: I1029 05:38:30.405077 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5092f51d-06fc-4dab-b0c4-32dc46cf7538-socket-dir\") pod \"csi-node-driver-5lk8x\" (UID: \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\") " pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:30.405281 kubelet[2003]: E1029 05:38:30.405171 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.405437 kubelet[2003]: W1029 05:38:30.405406 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.407489 kubelet[2003]: E1029 05:38:30.407461 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.408155 kubelet[2003]: E1029 05:38:30.408132 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.408706 kubelet[2003]: W1029 05:38:30.408674 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.408878 kubelet[2003]: E1029 05:38:30.408854 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.409355 kubelet[2003]: E1029 05:38:30.409332 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.409494 kubelet[2003]: W1029 05:38:30.409468 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.409638 kubelet[2003]: E1029 05:38:30.409612 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.411861 kubelet[2003]: E1029 05:38:30.411837 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.412059 kubelet[2003]: W1029 05:38:30.412005 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.412244 kubelet[2003]: E1029 05:38:30.412216 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.413813 kubelet[2003]: E1029 05:38:30.413790 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.414041 kubelet[2003]: W1029 05:38:30.414014 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.414193 kubelet[2003]: E1029 05:38:30.414167 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.415308 kubelet[2003]: E1029 05:38:30.415285 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.415526 kubelet[2003]: W1029 05:38:30.415466 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.415653 kubelet[2003]: E1029 05:38:30.415627 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.416522 env[1199]: time="2025-10-29T05:38:30.416476313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jl4v4,Uid:9d828122-1b59-4313-a7c3-4f8e849fc417,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:30.443344 env[1199]: time="2025-10-29T05:38:30.443207212Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:38:30.443654 env[1199]: time="2025-10-29T05:38:30.443598911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:38:30.443860 env[1199]: time="2025-10-29T05:38:30.443805870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:38:30.444347 env[1199]: time="2025-10-29T05:38:30.444294533Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1 pid=2495 runtime=io.containerd.runc.v2 Oct 29 05:38:30.485204 systemd[1]: Started cri-containerd-20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1.scope. Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.516594 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.517555 kubelet[2003]: W1029 05:38:30.516629 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.516666 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.517030 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.517555 kubelet[2003]: W1029 05:38:30.517047 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.517101 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.517443 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.517555 kubelet[2003]: W1029 05:38:30.517458 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.517555 kubelet[2003]: E1029 05:38:30.517474 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.519042 kubelet[2003]: E1029 05:38:30.519006 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.519042 kubelet[2003]: W1029 05:38:30.519036 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.519224 kubelet[2003]: E1029 05:38:30.519057 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.520794 kubelet[2003]: E1029 05:38:30.520767 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.520794 kubelet[2003]: W1029 05:38:30.520789 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.520996 kubelet[2003]: E1029 05:38:30.520811 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.521172 kubelet[2003]: E1029 05:38:30.521147 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.521172 kubelet[2003]: W1029 05:38:30.521168 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.521355 kubelet[2003]: E1029 05:38:30.521185 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.521470 kubelet[2003]: E1029 05:38:30.521447 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.521470 kubelet[2003]: W1029 05:38:30.521469 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.521637 kubelet[2003]: E1029 05:38:30.521486 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.522530 kubelet[2003]: E1029 05:38:30.522337 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.522530 kubelet[2003]: W1029 05:38:30.522360 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.522530 kubelet[2003]: E1029 05:38:30.522379 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.522751 kubelet[2003]: E1029 05:38:30.522663 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.522751 kubelet[2003]: W1029 05:38:30.522679 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.522751 kubelet[2003]: E1029 05:38:30.522694 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.523022 kubelet[2003]: E1029 05:38:30.522966 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.523022 kubelet[2003]: W1029 05:38:30.522987 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.523022 kubelet[2003]: E1029 05:38:30.523003 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.524551 kubelet[2003]: E1029 05:38:30.524526 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.524551 kubelet[2003]: W1029 05:38:30.524547 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.524707 kubelet[2003]: E1029 05:38:30.524569 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.524931 kubelet[2003]: E1029 05:38:30.524889 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.524931 kubelet[2003]: W1029 05:38:30.524920 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.525096 kubelet[2003]: E1029 05:38:30.524942 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.525308 kubelet[2003]: E1029 05:38:30.525195 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.525308 kubelet[2003]: W1029 05:38:30.525217 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.525308 kubelet[2003]: E1029 05:38:30.525233 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.527036 kubelet[2003]: E1029 05:38:30.527005 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.527036 kubelet[2003]: W1029 05:38:30.527027 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.527202 kubelet[2003]: E1029 05:38:30.527044 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.527364 kubelet[2003]: E1029 05:38:30.527339 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.527364 kubelet[2003]: W1029 05:38:30.527358 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.527543 kubelet[2003]: E1029 05:38:30.527375 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.528872 kubelet[2003]: E1029 05:38:30.528842 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.528872 kubelet[2003]: W1029 05:38:30.528863 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.529063 kubelet[2003]: E1029 05:38:30.528880 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.529236 kubelet[2003]: E1029 05:38:30.529207 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.529236 kubelet[2003]: W1029 05:38:30.529226 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.529389 kubelet[2003]: E1029 05:38:30.529243 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.530023 kubelet[2003]: E1029 05:38:30.529994 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.530023 kubelet[2003]: W1029 05:38:30.530015 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.530205 kubelet[2003]: E1029 05:38:30.530032 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.530362 kubelet[2003]: E1029 05:38:30.530336 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.530362 kubelet[2003]: W1029 05:38:30.530357 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.530511 kubelet[2003]: E1029 05:38:30.530374 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.531577 kubelet[2003]: E1029 05:38:30.531525 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.531577 kubelet[2003]: W1029 05:38:30.531545 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.531577 kubelet[2003]: E1029 05:38:30.531563 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.531858 kubelet[2003]: E1029 05:38:30.531833 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.531858 kubelet[2003]: W1029 05:38:30.531846 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.532006 kubelet[2003]: E1029 05:38:30.531861 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.533524 kubelet[2003]: E1029 05:38:30.533498 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.533524 kubelet[2003]: W1029 05:38:30.533519 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.533686 kubelet[2003]: E1029 05:38:30.533541 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534065 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.534776 kubelet[2003]: W1029 05:38:30.534085 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534103 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534423 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.534776 kubelet[2003]: W1029 05:38:30.534439 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534454 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534710 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.534776 kubelet[2003]: W1029 05:38:30.534724 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.534776 kubelet[2003]: E1029 05:38:30.534740 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.559149 kubelet[2003]: E1029 05:38:30.559073 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 05:38:30.559149 kubelet[2003]: W1029 05:38:30.559110 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 05:38:30.559149 kubelet[2003]: E1029 05:38:30.559154 2003 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.566000 audit: BPF prog-id=124 op=LOAD Oct 29 05:38:30.572000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.572000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646436623038643233373362666430343333623266346131366537 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646436623038643233373362666430343333623266346131366537 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.573000 audit: BPF prog-id=125 op=LOAD Oct 29 05:38:30.573000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0004100c0 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646436623038643233373362666430343333623266346131366537 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.574000 audit: BPF prog-id=126 op=LOAD Oct 29 05:38:30.574000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000410108 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646436623038643233373362666430343333623266346131366537 Oct 29 05:38:30.576000 audit: BPF prog-id=126 op=UNLOAD Oct 29 05:38:30.576000 audit: BPF prog-id=125 op=UNLOAD Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.576000 audit: BPF prog-id=127 op=LOAD Oct 29 05:38:30.576000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000410518 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646436623038643233373362666430343333623266346131366537 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.597000 audit: BPF prog-id=128 op=LOAD Oct 29 05:38:30.599000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.599000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2426 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861626535383030393138643531366633383363663062626636623532 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2426 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861626535383030393138643531366633383363663062626636623532 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.602000 audit: BPF prog-id=129 op=LOAD Oct 29 05:38:30.602000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000384480 items=0 ppid=2426 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861626535383030393138643531366633383363663062626636623532 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.604000 audit: BPF prog-id=130 op=LOAD Oct 29 05:38:30.604000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003844c8 items=0 ppid=2426 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861626535383030393138643531366633383363663062626636623532 Oct 29 05:38:30.605000 audit: BPF prog-id=130 op=UNLOAD Oct 29 05:38:30.606000 audit: BPF prog-id=129 op=UNLOAD Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:30.606000 audit: BPF prog-id=131 op=LOAD Oct 29 05:38:30.606000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003848d8 items=0 ppid=2426 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861626535383030393138643531366633383363663062626636623532 Oct 29 05:38:30.625343 env[1199]: time="2025-10-29T05:38:30.625151741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jl4v4,Uid:9d828122-1b59-4313-a7c3-4f8e849fc417,Namespace:calico-system,Attempt:0,} returns sandbox id \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\"" Oct 29 05:38:30.628811 env[1199]: time="2025-10-29T05:38:30.628774144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 29 05:38:30.727535 env[1199]: time="2025-10-29T05:38:30.727470277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-677789cd7b-sqhvz,Uid:53c4a77a-8bba-4a5b-956b-69795e4fae85,Namespace:calico-system,Attempt:0,} returns sandbox id \"8abe5800918d516f383cf0bbf6b52521666e11c344be4cce1faf51af9556cfa3\"" Oct 29 05:38:30.831000 audit[2574]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:30.831000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc42ed07b0 a2=0 a3=7ffc42ed079c items=0 ppid=2112 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:30.836000 audit[2574]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:30.836000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc42ed07b0 a2=0 a3=0 items=0 ppid=2112 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:30.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:31.420963 kubelet[2003]: E1029 05:38:31.420546 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:32.259554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount70397181.mount: Deactivated successfully. Oct 29 05:38:32.466755 env[1199]: time="2025-10-29T05:38:32.465931815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:32.468949 env[1199]: time="2025-10-29T05:38:32.467758729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:32.471303 env[1199]: time="2025-10-29T05:38:32.471260088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:32.476865 env[1199]: time="2025-10-29T05:38:32.476820106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 29 05:38:32.477547 env[1199]: time="2025-10-29T05:38:32.477505822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:32.486881 env[1199]: time="2025-10-29T05:38:32.486745075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 29 05:38:32.489721 env[1199]: time="2025-10-29T05:38:32.489669108Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 29 05:38:32.511245 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1611532058.mount: Deactivated successfully. Oct 29 05:38:32.520748 env[1199]: time="2025-10-29T05:38:32.520694104Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b\"" Oct 29 05:38:32.523872 env[1199]: time="2025-10-29T05:38:32.523811674Z" level=info msg="StartContainer for \"f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b\"" Oct 29 05:38:32.567768 systemd[1]: Started cri-containerd-f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b.scope. Oct 29 05:38:32.615000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.615000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f147dd008e8 items=0 ppid=2495 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:32.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632383930326437336162346433346636353661383138383964393864 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit: BPF prog-id=132 op=LOAD Oct 29 05:38:32.616000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bd88 items=0 ppid=2495 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:32.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632383930326437336162346433346636353661383138383964393864 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit: BPF prog-id=133 op=LOAD Oct 29 05:38:32.616000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bdd8 items=0 ppid=2495 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:32.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632383930326437336162346433346636353661383138383964393864 Oct 29 05:38:32.616000 audit: BPF prog-id=133 op=UNLOAD Oct 29 05:38:32.616000 audit: BPF prog-id=132 op=UNLOAD Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:32.616000 audit: BPF prog-id=134 op=LOAD Oct 29 05:38:32.616000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032be68 items=0 ppid=2495 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:32.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632383930326437336162346433346636353661383138383964393864 Oct 29 05:38:32.647842 env[1199]: time="2025-10-29T05:38:32.647776903Z" level=info msg="StartContainer for \"f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b\" returns successfully" Oct 29 05:38:32.675398 systemd[1]: cri-containerd-f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b.scope: Deactivated successfully. Oct 29 05:38:32.676000 audit: BPF prog-id=134 op=UNLOAD Oct 29 05:38:32.678836 kernel: kauditd_printk_skb: 177 callbacks suppressed Oct 29 05:38:32.678988 kernel: audit: type=1334 audit(1761716312.676:1019): prog-id=134 op=UNLOAD Oct 29 05:38:32.767005 env[1199]: time="2025-10-29T05:38:32.766826177Z" level=info msg="shim disconnected" id=f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b Oct 29 05:38:32.767005 env[1199]: time="2025-10-29T05:38:32.766921352Z" level=warning msg="cleaning up after shim disconnected" id=f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b namespace=k8s.io Oct 29 05:38:32.767005 env[1199]: time="2025-10-29T05:38:32.766945567Z" level=info msg="cleaning up dead shim" Oct 29 05:38:32.785830 env[1199]: time="2025-10-29T05:38:32.785764536Z" level=warning msg="cleanup warnings time=\"2025-10-29T05:38:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2619 runtime=io.containerd.runc.v2\n" Oct 29 05:38:33.175154 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f28902d73ab4d34f656a81889d98d070c81f6901686e4d63c6a616e6dba7fb6b-rootfs.mount: Deactivated successfully. Oct 29 05:38:33.422423 kubelet[2003]: E1029 05:38:33.420641 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:35.420128 kubelet[2003]: E1029 05:38:35.420016 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:35.850492 env[1199]: time="2025-10-29T05:38:35.850416533Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:35.852630 env[1199]: time="2025-10-29T05:38:35.852585480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:35.854783 env[1199]: time="2025-10-29T05:38:35.854747775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:35.856499 env[1199]: time="2025-10-29T05:38:35.856434642Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:35.857543 env[1199]: time="2025-10-29T05:38:35.857504617Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 29 05:38:35.861625 env[1199]: time="2025-10-29T05:38:35.860535007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 29 05:38:35.898683 env[1199]: time="2025-10-29T05:38:35.898619300Z" level=info msg="CreateContainer within sandbox \"8abe5800918d516f383cf0bbf6b52521666e11c344be4cce1faf51af9556cfa3\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 29 05:38:35.952294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1050201807.mount: Deactivated successfully. Oct 29 05:38:35.957656 env[1199]: time="2025-10-29T05:38:35.957603534Z" level=info msg="CreateContainer within sandbox \"8abe5800918d516f383cf0bbf6b52521666e11c344be4cce1faf51af9556cfa3\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b497eb595d3f26e83cd09e561092d3c7b215cee6108965453ae08f9b362a297c\"" Oct 29 05:38:35.960920 env[1199]: time="2025-10-29T05:38:35.960863043Z" level=info msg="StartContainer for \"b497eb595d3f26e83cd09e561092d3c7b215cee6108965453ae08f9b362a297c\"" Oct 29 05:38:36.000490 systemd[1]: Started cri-containerd-b497eb595d3f26e83cd09e561092d3c7b215cee6108965453ae08f9b362a297c.scope. Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.058931 kernel: audit: type=1400 audit(1761716316.047:1020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.059079 kernel: audit: type=1400 audit(1761716316.047:1021): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068239 kernel: audit: type=1400 audit(1761716316.047:1022): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.074936 kernel: audit: type=1400 audit(1761716316.047:1023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.080941 kernel: audit: type=1400 audit(1761716316.047:1024): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.092037 kernel: audit: type=1400 audit(1761716316.047:1025): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.092119 kernel: audit: type=1400 audit(1761716316.047:1026): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.097679 kernel: audit: type=1400 audit(1761716316.047:1027): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.102949 kernel: audit: type=1400 audit(1761716316.047:1028): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.058000 audit: BPF prog-id=135 op=LOAD Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2426 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:36.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234393765623539356433663236653833636430396535363130393264 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2426 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:36.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234393765623539356433663236653833636430396535363130393264 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.061000 audit: BPF prog-id=136 op=LOAD Oct 29 05:38:36.061000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000390ce0 items=0 ppid=2426 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:36.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234393765623539356433663236653833636430396535363130393264 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.066000 audit: BPF prog-id=137 op=LOAD Oct 29 05:38:36.066000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390d28 items=0 ppid=2426 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:36.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234393765623539356433663236653833636430396535363130393264 Oct 29 05:38:36.066000 audit: BPF prog-id=137 op=UNLOAD Oct 29 05:38:36.068000 audit: BPF prog-id=136 op=UNLOAD Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:36.068000 audit: BPF prog-id=138 op=LOAD Oct 29 05:38:36.068000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000391138 items=0 ppid=2426 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:36.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234393765623539356433663236653833636430396535363130393264 Oct 29 05:38:36.146438 env[1199]: time="2025-10-29T05:38:36.146366446Z" level=info msg="StartContainer for \"b497eb595d3f26e83cd09e561092d3c7b215cee6108965453ae08f9b362a297c\" returns successfully" Oct 29 05:38:36.571867 kubelet[2003]: I1029 05:38:36.571679 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-677789cd7b-sqhvz" podStartSLOduration=2.4454539410000002 podStartE2EDuration="7.571637125s" podCreationTimestamp="2025-10-29 05:38:29 +0000 UTC" firstStartedPulling="2025-10-29 05:38:30.732663689 +0000 UTC m=+22.631317217" lastFinishedPulling="2025-10-29 05:38:35.858846878 +0000 UTC m=+27.757500401" observedRunningTime="2025-10-29 05:38:36.570359838 +0000 UTC m=+28.469013381" watchObservedRunningTime="2025-10-29 05:38:36.571637125 +0000 UTC m=+28.470290661" Oct 29 05:38:37.421757 kubelet[2003]: E1029 05:38:37.420879 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:37.555889 kubelet[2003]: I1029 05:38:37.555768 2003 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 29 05:38:38.304000 audit[2679]: NETFILTER_CFG table=filter:103 family=2 entries=21 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:38.310828 kernel: kauditd_printk_skb: 48 callbacks suppressed Oct 29 05:38:38.311052 kernel: audit: type=1325 audit(1761716318.304:1038): table=filter:103 family=2 entries=21 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:38.315033 kernel: audit: type=1300 audit(1761716318.304:1038): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffffbbb7100 a2=0 a3=7ffffbbb70ec items=0 ppid=2112 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:38.304000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffffbbb7100 a2=0 a3=7ffffbbb70ec items=0 ppid=2112 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:38.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:38.327493 kernel: audit: type=1327 audit(1761716318.304:1038): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:38.330000 audit[2679]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:38.340929 kernel: audit: type=1325 audit(1761716318.330:1039): table=nat:104 family=2 entries=19 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:38:38.341123 kernel: audit: type=1300 audit(1761716318.330:1039): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffffbbb7100 a2=0 a3=7ffffbbb70ec items=0 ppid=2112 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:38.330000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffffbbb7100 a2=0 a3=7ffffbbb70ec items=0 ppid=2112 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:38.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:38.353929 kernel: audit: type=1327 audit(1761716318.330:1039): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:38:39.423876 kubelet[2003]: E1029 05:38:39.423786 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:41.420798 kubelet[2003]: E1029 05:38:41.420619 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:42.265429 env[1199]: time="2025-10-29T05:38:42.265325417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:42.268524 env[1199]: time="2025-10-29T05:38:42.268480488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:42.270622 env[1199]: time="2025-10-29T05:38:42.270573137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:42.272869 env[1199]: time="2025-10-29T05:38:42.272817437Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:42.273831 env[1199]: time="2025-10-29T05:38:42.273772976Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 29 05:38:42.283264 env[1199]: time="2025-10-29T05:38:42.283198498Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 29 05:38:42.307314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2672727841.mount: Deactivated successfully. Oct 29 05:38:42.316538 env[1199]: time="2025-10-29T05:38:42.316479833Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684\"" Oct 29 05:38:42.320283 env[1199]: time="2025-10-29T05:38:42.320221276Z" level=info msg="StartContainer for \"2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684\"" Oct 29 05:38:42.374887 systemd[1]: run-containerd-runc-k8s.io-2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684-runc.0yYEN7.mount: Deactivated successfully. Oct 29 05:38:42.379128 systemd[1]: Started cri-containerd-2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684.scope. Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.430155 kernel: audit: type=1400 audit(1761716322.421:1040): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb8dc15a368 items=0 ppid=2495 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:42.439189 kernel: audit: type=1300 audit(1761716322.421:1040): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb8dc15a368 items=0 ppid=2495 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:42.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623462306539353233366233373130303165303864643733363337 Oct 29 05:38:42.452070 kernel: audit: type=1327 audit(1761716322.421:1040): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623462306539353233366233373130303165303864643733363337 Oct 29 05:38:42.452179 kernel: audit: type=1400 audit(1761716322.421:1041): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.421000 audit: BPF prog-id=139 op=LOAD Oct 29 05:38:42.421000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfc08 items=0 ppid=2495 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:42.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623462306539353233366233373130303165303864643733363337 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit: BPF prog-id=140 op=LOAD Oct 29 05:38:42.429000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfc58 items=0 ppid=2495 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623462306539353233366233373130303165303864643733363337 Oct 29 05:38:42.429000 audit: BPF prog-id=140 op=UNLOAD Oct 29 05:38:42.429000 audit: BPF prog-id=139 op=UNLOAD Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:42.429000 audit: BPF prog-id=141 op=LOAD Oct 29 05:38:42.429000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfce8 items=0 ppid=2495 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623462306539353233366233373130303165303864643733363337 Oct 29 05:38:42.486302 env[1199]: time="2025-10-29T05:38:42.486229875Z" level=info msg="StartContainer for \"2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684\" returns successfully" Oct 29 05:38:43.420278 kubelet[2003]: E1029 05:38:43.420192 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:43.788655 env[1199]: time="2025-10-29T05:38:43.788419239Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 05:38:43.793873 systemd[1]: cri-containerd-2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684.scope: Deactivated successfully. Oct 29 05:38:43.798000 audit: BPF prog-id=141 op=UNLOAD Oct 29 05:38:43.801089 kernel: kauditd_printk_skb: 39 callbacks suppressed Oct 29 05:38:43.801656 kernel: audit: type=1334 audit(1761716323.798:1046): prog-id=141 op=UNLOAD Oct 29 05:38:43.807817 kubelet[2003]: I1029 05:38:43.804539 2003 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 29 05:38:43.847631 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684-rootfs.mount: Deactivated successfully. Oct 29 05:38:43.872971 env[1199]: time="2025-10-29T05:38:43.872878429Z" level=info msg="shim disconnected" id=2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684 Oct 29 05:38:43.873339 env[1199]: time="2025-10-29T05:38:43.873302178Z" level=warning msg="cleaning up after shim disconnected" id=2ab4b0e95236b371001e08dd73637acafaf0a00e62769dd62281057159f72684 namespace=k8s.io Oct 29 05:38:43.873510 env[1199]: time="2025-10-29T05:38:43.873466638Z" level=info msg="cleaning up dead shim" Oct 29 05:38:43.905857 env[1199]: time="2025-10-29T05:38:43.905789510Z" level=warning msg="cleanup warnings time=\"2025-10-29T05:38:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2731 runtime=io.containerd.runc.v2\n" Oct 29 05:38:43.980175 systemd[1]: Created slice kubepods-burstable-podb5e3bce5_6700_4e82_84e0_b76d2b64eb1f.slice. Oct 29 05:38:44.017592 systemd[1]: Created slice kubepods-besteffort-pod1215c1dc_2e72_4d1b_9366_b75eae9af1f6.slice. Oct 29 05:38:44.037451 systemd[1]: Created slice kubepods-besteffort-pod8893c55d_6f83_44df_994b_b713e5abd120.slice. Oct 29 05:38:44.047625 systemd[1]: Created slice kubepods-besteffort-pode6ea8502_2cb9_417e_83f2_d0631b0ba769.slice. Oct 29 05:38:44.062665 systemd[1]: Created slice kubepods-burstable-pod43f5bd14_1490_4579_b736_7553352437ec.slice. Oct 29 05:38:44.064590 kubelet[2003]: I1029 05:38:44.064146 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/43f5bd14-1490-4579-b736-7553352437ec-config-volume\") pod \"coredns-674b8bbfcf-t6vrc\" (UID: \"43f5bd14-1490-4579-b736-7553352437ec\") " pod="kube-system/coredns-674b8bbfcf-t6vrc" Oct 29 05:38:44.064590 kubelet[2003]: I1029 05:38:44.064215 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7n7b8\" (UniqueName: \"kubernetes.io/projected/43f5bd14-1490-4579-b736-7553352437ec-kube-api-access-7n7b8\") pod \"coredns-674b8bbfcf-t6vrc\" (UID: \"43f5bd14-1490-4579-b736-7553352437ec\") " pod="kube-system/coredns-674b8bbfcf-t6vrc" Oct 29 05:38:44.064590 kubelet[2003]: I1029 05:38:44.064296 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8893c55d-6f83-44df-994b-b713e5abd120-tigera-ca-bundle\") pod \"calico-kube-controllers-8cf699dc5-hszxg\" (UID: \"8893c55d-6f83-44df-994b-b713e5abd120\") " pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" Oct 29 05:38:44.064590 kubelet[2003]: I1029 05:38:44.064345 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sq27z\" (UniqueName: \"kubernetes.io/projected/e6ea8502-2cb9-417e-83f2-d0631b0ba769-kube-api-access-sq27z\") pod \"calico-apiserver-779769bb48-8n95q\" (UID: \"e6ea8502-2cb9-417e-83f2-d0631b0ba769\") " pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" Oct 29 05:38:44.064590 kubelet[2003]: I1029 05:38:44.064393 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e6ea8502-2cb9-417e-83f2-d0631b0ba769-calico-apiserver-certs\") pod \"calico-apiserver-779769bb48-8n95q\" (UID: \"e6ea8502-2cb9-417e-83f2-d0631b0ba769\") " pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" Oct 29 05:38:44.065827 kubelet[2003]: I1029 05:38:44.064457 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f6zjx\" (UniqueName: \"kubernetes.io/projected/b5e3bce5-6700-4e82-84e0-b76d2b64eb1f-kube-api-access-f6zjx\") pod \"coredns-674b8bbfcf-8qcp7\" (UID: \"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f\") " pod="kube-system/coredns-674b8bbfcf-8qcp7" Oct 29 05:38:44.065827 kubelet[2003]: I1029 05:38:44.064495 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b5e3bce5-6700-4e82-84e0-b76d2b64eb1f-config-volume\") pod \"coredns-674b8bbfcf-8qcp7\" (UID: \"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f\") " pod="kube-system/coredns-674b8bbfcf-8qcp7" Oct 29 05:38:44.065827 kubelet[2003]: I1029 05:38:44.064540 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2425b\" (UniqueName: \"kubernetes.io/projected/8893c55d-6f83-44df-994b-b713e5abd120-kube-api-access-2425b\") pod \"calico-kube-controllers-8cf699dc5-hszxg\" (UID: \"8893c55d-6f83-44df-994b-b713e5abd120\") " pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" Oct 29 05:38:44.065827 kubelet[2003]: I1029 05:38:44.064578 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1215c1dc-2e72-4d1b-9366-b75eae9af1f6-calico-apiserver-certs\") pod \"calico-apiserver-779769bb48-tjm6f\" (UID: \"1215c1dc-2e72-4d1b-9366-b75eae9af1f6\") " pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" Oct 29 05:38:44.065827 kubelet[2003]: I1029 05:38:44.064613 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wm5qr\" (UniqueName: \"kubernetes.io/projected/1215c1dc-2e72-4d1b-9366-b75eae9af1f6-kube-api-access-wm5qr\") pod \"calico-apiserver-779769bb48-tjm6f\" (UID: \"1215c1dc-2e72-4d1b-9366-b75eae9af1f6\") " pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" Oct 29 05:38:44.075188 systemd[1]: Created slice kubepods-besteffort-podc6a0ae0a_392f_42e9_8917_4eeb8b86e85c.slice. Oct 29 05:38:44.084188 systemd[1]: Created slice kubepods-besteffort-pod0a16c382_7972_443c_9db3_496964663d75.slice. Oct 29 05:38:44.166059 kubelet[2003]: I1029 05:38:44.165979 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nnhg9\" (UniqueName: \"kubernetes.io/projected/0a16c382-7972-443c-9db3-496964663d75-kube-api-access-nnhg9\") pod \"whisker-bf949d9f7-8mjrq\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " pod="calico-system/whisker-bf949d9f7-8mjrq" Oct 29 05:38:44.166059 kubelet[2003]: I1029 05:38:44.166065 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/c6a0ae0a-392f-42e9-8917-4eeb8b86e85c-config\") pod \"goldmane-666569f655-nskqc\" (UID: \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\") " pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.166384 kubelet[2003]: I1029 05:38:44.166139 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6a0ae0a-392f-42e9-8917-4eeb8b86e85c-goldmane-ca-bundle\") pod \"goldmane-666569f655-nskqc\" (UID: \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\") " pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.166384 kubelet[2003]: I1029 05:38:44.166232 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a16c382-7972-443c-9db3-496964663d75-whisker-ca-bundle\") pod \"whisker-bf949d9f7-8mjrq\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " pod="calico-system/whisker-bf949d9f7-8mjrq" Oct 29 05:38:44.166384 kubelet[2003]: I1029 05:38:44.166318 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b9gfx\" (UniqueName: \"kubernetes.io/projected/c6a0ae0a-392f-42e9-8917-4eeb8b86e85c-kube-api-access-b9gfx\") pod \"goldmane-666569f655-nskqc\" (UID: \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\") " pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.166721 kubelet[2003]: I1029 05:38:44.166394 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a16c382-7972-443c-9db3-496964663d75-whisker-backend-key-pair\") pod \"whisker-bf949d9f7-8mjrq\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " pod="calico-system/whisker-bf949d9f7-8mjrq" Oct 29 05:38:44.166721 kubelet[2003]: I1029 05:38:44.166451 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/c6a0ae0a-392f-42e9-8917-4eeb8b86e85c-goldmane-key-pair\") pod \"goldmane-666569f655-nskqc\" (UID: \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\") " pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.313847 env[1199]: time="2025-10-29T05:38:44.313193419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8qcp7,Uid:b5e3bce5-6700-4e82-84e0-b76d2b64eb1f,Namespace:kube-system,Attempt:0,}" Oct 29 05:38:44.329727 env[1199]: time="2025-10-29T05:38:44.329667928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-tjm6f,Uid:1215c1dc-2e72-4d1b-9366-b75eae9af1f6,Namespace:calico-apiserver,Attempt:0,}" Oct 29 05:38:44.344894 env[1199]: time="2025-10-29T05:38:44.344816947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8cf699dc5-hszxg,Uid:8893c55d-6f83-44df-994b-b713e5abd120,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:44.359828 env[1199]: time="2025-10-29T05:38:44.359739646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-8n95q,Uid:e6ea8502-2cb9-417e-83f2-d0631b0ba769,Namespace:calico-apiserver,Attempt:0,}" Oct 29 05:38:44.380539 env[1199]: time="2025-10-29T05:38:44.380467153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-nskqc,Uid:c6a0ae0a-392f-42e9-8917-4eeb8b86e85c,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:44.383777 env[1199]: time="2025-10-29T05:38:44.383735660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-t6vrc,Uid:43f5bd14-1490-4579-b736-7553352437ec,Namespace:kube-system,Attempt:0,}" Oct 29 05:38:44.396745 env[1199]: time="2025-10-29T05:38:44.396639901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-bf949d9f7-8mjrq,Uid:0a16c382-7972-443c-9db3-496964663d75,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:44.582894 env[1199]: time="2025-10-29T05:38:44.581768283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 29 05:38:44.770999 env[1199]: time="2025-10-29T05:38:44.770832658Z" level=error msg="Failed to destroy network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.771799 env[1199]: time="2025-10-29T05:38:44.771751309Z" level=error msg="encountered an error cleaning up failed sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.772055 env[1199]: time="2025-10-29T05:38:44.771963222Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-t6vrc,Uid:43f5bd14-1490-4579-b736-7553352437ec,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.775474 env[1199]: time="2025-10-29T05:38:44.775428076Z" level=error msg="Failed to destroy network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.777400 env[1199]: time="2025-10-29T05:38:44.776809641Z" level=error msg="encountered an error cleaning up failed sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.778012 kubelet[2003]: E1029 05:38:44.777901 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.778745 env[1199]: time="2025-10-29T05:38:44.778694774Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-bf949d9f7-8mjrq,Uid:0a16c382-7972-443c-9db3-496964663d75,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.779308 kubelet[2003]: E1029 05:38:44.779267 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-t6vrc" Oct 29 05:38:44.779884 kubelet[2003]: E1029 05:38:44.779835 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.780081 kubelet[2003]: E1029 05:38:44.780047 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-bf949d9f7-8mjrq" Oct 29 05:38:44.781084 kubelet[2003]: E1029 05:38:44.781039 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-bf949d9f7-8mjrq" Oct 29 05:38:44.781321 kubelet[2003]: E1029 05:38:44.781261 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-bf949d9f7-8mjrq_calico-system(0a16c382-7972-443c-9db3-496964663d75)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-bf949d9f7-8mjrq_calico-system(0a16c382-7972-443c-9db3-496964663d75)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-bf949d9f7-8mjrq" podUID="0a16c382-7972-443c-9db3-496964663d75" Oct 29 05:38:44.784025 kubelet[2003]: E1029 05:38:44.783982 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-t6vrc" Oct 29 05:38:44.784252 kubelet[2003]: E1029 05:38:44.784206 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-t6vrc_kube-system(43f5bd14-1490-4579-b736-7553352437ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-t6vrc_kube-system(43f5bd14-1490-4579-b736-7553352437ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-t6vrc" podUID="43f5bd14-1490-4579-b736-7553352437ec" Oct 29 05:38:44.895635 env[1199]: time="2025-10-29T05:38:44.895512217Z" level=error msg="Failed to destroy network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.897030 env[1199]: time="2025-10-29T05:38:44.896968757Z" level=error msg="encountered an error cleaning up failed sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.898330 env[1199]: time="2025-10-29T05:38:44.898282926Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8qcp7,Uid:b5e3bce5-6700-4e82-84e0-b76d2b64eb1f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.900322 kubelet[2003]: E1029 05:38:44.898740 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.900322 kubelet[2003]: E1029 05:38:44.898835 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8qcp7" Oct 29 05:38:44.900322 kubelet[2003]: E1029 05:38:44.898886 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8qcp7" Oct 29 05:38:44.899570 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069-shm.mount: Deactivated successfully. Oct 29 05:38:44.902557 kubelet[2003]: E1029 05:38:44.899024 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-8qcp7_kube-system(b5e3bce5-6700-4e82-84e0-b76d2b64eb1f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-8qcp7_kube-system(b5e3bce5-6700-4e82-84e0-b76d2b64eb1f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8qcp7" podUID="b5e3bce5-6700-4e82-84e0-b76d2b64eb1f" Oct 29 05:38:44.902752 env[1199]: time="2025-10-29T05:38:44.902212042Z" level=error msg="Failed to destroy network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.904489 env[1199]: time="2025-10-29T05:38:44.903634812Z" level=error msg="encountered an error cleaning up failed sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.904718 env[1199]: time="2025-10-29T05:38:44.904660159Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-8n95q,Uid:e6ea8502-2cb9-417e-83f2-d0631b0ba769,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.905389 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca-shm.mount: Deactivated successfully. Oct 29 05:38:44.906525 kubelet[2003]: E1029 05:38:44.906346 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.906525 kubelet[2003]: E1029 05:38:44.906419 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" Oct 29 05:38:44.906525 kubelet[2003]: E1029 05:38:44.906450 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" Oct 29 05:38:44.908257 kubelet[2003]: E1029 05:38:44.906516 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:38:44.913147 env[1199]: time="2025-10-29T05:38:44.913054091Z" level=error msg="Failed to destroy network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.920149 env[1199]: time="2025-10-29T05:38:44.915060470Z" level=error msg="encountered an error cleaning up failed sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.920149 env[1199]: time="2025-10-29T05:38:44.915134138Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-tjm6f,Uid:1215c1dc-2e72-4d1b-9366-b75eae9af1f6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.920374 kubelet[2003]: E1029 05:38:44.917511 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.920374 kubelet[2003]: E1029 05:38:44.917605 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" Oct 29 05:38:44.920374 kubelet[2003]: E1029 05:38:44.917674 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" Oct 29 05:38:44.916220 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4-shm.mount: Deactivated successfully. Oct 29 05:38:44.920697 kubelet[2003]: E1029 05:38:44.917775 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:38:44.934340 env[1199]: time="2025-10-29T05:38:44.934260338Z" level=error msg="Failed to destroy network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.937878 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018-shm.mount: Deactivated successfully. Oct 29 05:38:44.939875 env[1199]: time="2025-10-29T05:38:44.939815359Z" level=error msg="encountered an error cleaning up failed sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.941536 env[1199]: time="2025-10-29T05:38:44.939899801Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8cf699dc5-hszxg,Uid:8893c55d-6f83-44df-994b-b713e5abd120,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.941536 env[1199]: time="2025-10-29T05:38:44.940576176Z" level=error msg="Failed to destroy network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.942197 kubelet[2003]: E1029 05:38:44.940259 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.942197 kubelet[2003]: E1029 05:38:44.940339 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" Oct 29 05:38:44.942197 kubelet[2003]: E1029 05:38:44.940374 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" Oct 29 05:38:44.942605 kubelet[2003]: E1029 05:38:44.940477 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:38:44.943847 env[1199]: time="2025-10-29T05:38:44.943775749Z" level=error msg="encountered an error cleaning up failed sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.944485 env[1199]: time="2025-10-29T05:38:44.944392248Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-nskqc,Uid:c6a0ae0a-392f-42e9-8917-4eeb8b86e85c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.945220 kubelet[2003]: E1029 05:38:44.945135 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:44.945301 kubelet[2003]: E1029 05:38:44.945252 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.945374 kubelet[2003]: E1029 05:38:44.945288 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-nskqc" Oct 29 05:38:44.945456 kubelet[2003]: E1029 05:38:44.945384 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:38:45.429395 systemd[1]: Created slice kubepods-besteffort-pod5092f51d_06fc_4dab_b0c4_32dc46cf7538.slice. Oct 29 05:38:45.434370 env[1199]: time="2025-10-29T05:38:45.434294822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5lk8x,Uid:5092f51d-06fc-4dab-b0c4-32dc46cf7538,Namespace:calico-system,Attempt:0,}" Oct 29 05:38:45.590101 kubelet[2003]: I1029 05:38:45.589973 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:45.595815 kubelet[2003]: I1029 05:38:45.594980 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:45.598208 kubelet[2003]: I1029 05:38:45.597900 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:45.601181 kubelet[2003]: I1029 05:38:45.600636 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:45.604105 env[1199]: time="2025-10-29T05:38:45.604021991Z" level=info msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" Oct 29 05:38:45.605434 env[1199]: time="2025-10-29T05:38:45.605251219Z" level=info msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" Oct 29 05:38:45.607266 env[1199]: time="2025-10-29T05:38:45.605903309Z" level=info msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" Oct 29 05:38:45.607850 env[1199]: time="2025-10-29T05:38:45.607810734Z" level=info msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" Oct 29 05:38:45.611369 kubelet[2003]: I1029 05:38:45.611305 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:45.615826 env[1199]: time="2025-10-29T05:38:45.615769023Z" level=info msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" Oct 29 05:38:45.619066 kubelet[2003]: I1029 05:38:45.618842 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:38:45.620152 env[1199]: time="2025-10-29T05:38:45.620111831Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:38:45.624336 kubelet[2003]: I1029 05:38:45.623929 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:45.625442 env[1199]: time="2025-10-29T05:38:45.625392180Z" level=info msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" Oct 29 05:38:45.630417 env[1199]: time="2025-10-29T05:38:45.630234139Z" level=error msg="Failed to destroy network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.634970 env[1199]: time="2025-10-29T05:38:45.631195008Z" level=error msg="encountered an error cleaning up failed sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.634970 env[1199]: time="2025-10-29T05:38:45.631310449Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5lk8x,Uid:5092f51d-06fc-4dab-b0c4-32dc46cf7538,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.635305 kubelet[2003]: E1029 05:38:45.631617 2003 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.635305 kubelet[2003]: E1029 05:38:45.631785 2003 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:45.635305 kubelet[2003]: E1029 05:38:45.631839 2003 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5lk8x" Oct 29 05:38:45.635722 kubelet[2003]: E1029 05:38:45.631954 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:45.761663 env[1199]: time="2025-10-29T05:38:45.761422729Z" level=error msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" failed" error="failed to destroy network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.762740 kubelet[2003]: E1029 05:38:45.762263 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:45.762740 kubelet[2003]: E1029 05:38:45.762444 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca"} Oct 29 05:38:45.762740 kubelet[2003]: E1029 05:38:45.762613 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e6ea8502-2cb9-417e-83f2-d0631b0ba769\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.762740 kubelet[2003]: E1029 05:38:45.762666 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e6ea8502-2cb9-417e-83f2-d0631b0ba769\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:38:45.820859 env[1199]: time="2025-10-29T05:38:45.820753264Z" level=error msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" failed" error="failed to destroy network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.821562 kubelet[2003]: E1029 05:38:45.821479 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:38:45.822153 kubelet[2003]: E1029 05:38:45.821584 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018"} Oct 29 05:38:45.822153 kubelet[2003]: E1029 05:38:45.821721 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8893c55d-6f83-44df-994b-b713e5abd120\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.822153 kubelet[2003]: E1029 05:38:45.821763 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8893c55d-6f83-44df-994b-b713e5abd120\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:38:45.825721 env[1199]: time="2025-10-29T05:38:45.825629699Z" level=error msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" failed" error="failed to destroy network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.827352 env[1199]: time="2025-10-29T05:38:45.826982431Z" level=error msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" failed" error="failed to destroy network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.827470 kubelet[2003]: E1029 05:38:45.826142 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:45.827470 kubelet[2003]: E1029 05:38:45.826220 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069"} Oct 29 05:38:45.827470 kubelet[2003]: E1029 05:38:45.826280 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.827470 kubelet[2003]: E1029 05:38:45.826330 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8qcp7" podUID="b5e3bce5-6700-4e82-84e0-b76d2b64eb1f" Oct 29 05:38:45.827832 kubelet[2003]: E1029 05:38:45.827190 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:45.827832 kubelet[2003]: E1029 05:38:45.827251 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6"} Oct 29 05:38:45.827832 kubelet[2003]: E1029 05:38:45.827401 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a16c382-7972-443c-9db3-496964663d75\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.827832 kubelet[2003]: E1029 05:38:45.827460 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a16c382-7972-443c-9db3-496964663d75\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-bf949d9f7-8mjrq" podUID="0a16c382-7972-443c-9db3-496964663d75" Oct 29 05:38:45.835062 env[1199]: time="2025-10-29T05:38:45.834935701Z" level=error msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" failed" error="failed to destroy network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.835897 kubelet[2003]: E1029 05:38:45.835737 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:45.836033 kubelet[2003]: E1029 05:38:45.835953 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4"} Oct 29 05:38:45.836118 kubelet[2003]: E1029 05:38:45.836070 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1215c1dc-2e72-4d1b-9366-b75eae9af1f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.836274 kubelet[2003]: E1029 05:38:45.836135 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1215c1dc-2e72-4d1b-9366-b75eae9af1f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:38:45.840656 env[1199]: time="2025-10-29T05:38:45.840567936Z" level=error msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" failed" error="failed to destroy network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.841481 kubelet[2003]: E1029 05:38:45.841169 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:45.841481 kubelet[2003]: E1029 05:38:45.841287 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d"} Oct 29 05:38:45.841481 kubelet[2003]: E1029 05:38:45.841362 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.841481 kubelet[2003]: E1029 05:38:45.841405 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:38:45.846358 env[1199]: time="2025-10-29T05:38:45.846271967Z" level=error msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" failed" error="failed to destroy network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:45.847532 kubelet[2003]: E1029 05:38:45.846968 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:45.847532 kubelet[2003]: E1029 05:38:45.847248 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d"} Oct 29 05:38:45.847532 kubelet[2003]: E1029 05:38:45.847337 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"43f5bd14-1490-4579-b736-7553352437ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:45.847532 kubelet[2003]: E1029 05:38:45.847391 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"43f5bd14-1490-4579-b736-7553352437ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-t6vrc" podUID="43f5bd14-1490-4579-b736-7553352437ec" Oct 29 05:38:45.848608 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d-shm.mount: Deactivated successfully. Oct 29 05:38:46.638347 kubelet[2003]: I1029 05:38:46.637663 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:38:46.649712 env[1199]: time="2025-10-29T05:38:46.649608879Z" level=info msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" Oct 29 05:38:46.724896 env[1199]: time="2025-10-29T05:38:46.724745658Z" level=error msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" failed" error="failed to destroy network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:46.725328 kubelet[2003]: E1029 05:38:46.725256 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:38:46.725482 kubelet[2003]: E1029 05:38:46.725357 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d"} Oct 29 05:38:46.725482 kubelet[2003]: E1029 05:38:46.725454 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:46.725691 kubelet[2003]: E1029 05:38:46.725497 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5092f51d-06fc-4dab-b0c4-32dc46cf7538\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:38:57.112211 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4237836373.mount: Deactivated successfully. Oct 29 05:38:57.166966 env[1199]: time="2025-10-29T05:38:57.166829711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:57.170357 env[1199]: time="2025-10-29T05:38:57.170318225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:57.172843 env[1199]: time="2025-10-29T05:38:57.172805466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:57.175014 env[1199]: time="2025-10-29T05:38:57.174977896Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 05:38:57.176422 env[1199]: time="2025-10-29T05:38:57.176270556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 29 05:38:57.226422 env[1199]: time="2025-10-29T05:38:57.226342514Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 29 05:38:57.248566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount943492165.mount: Deactivated successfully. Oct 29 05:38:57.254291 env[1199]: time="2025-10-29T05:38:57.254235992Z" level=info msg="CreateContainer within sandbox \"20dd6b08d2373bfd0433b2f4a16e70520c0f39c545c876e5106b6af5b3fe59c1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64\"" Oct 29 05:38:57.257781 env[1199]: time="2025-10-29T05:38:57.256189013Z" level=info msg="StartContainer for \"c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64\"" Oct 29 05:38:57.296236 systemd[1]: Started cri-containerd-c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64.scope. Oct 29 05:38:57.357000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.381123 kernel: audit: type=1400 audit(1761716337.357:1047): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.381321 kernel: audit: type=1300 audit(1761716337.357:1047): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff249d8cde8 items=0 ppid=2495 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:57.381676 kernel: audit: type=1327 audit(1761716337.357:1047): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653833343465663737373061633562326563303037623961316538 Oct 29 05:38:57.357000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff249d8cde8 items=0 ppid=2495 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:57.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653833343465663737373061633562326563303037623961316538 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.395639 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.396050 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.396123 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.406073 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.411539 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.414171 env[1199]: time="2025-10-29T05:38:57.414119745Z" level=info msg="StartContainer for \"c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64\" returns successfully" Oct 29 05:38:57.416778 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.436938 kernel: audit: type=1400 audit(1761716337.362:1048): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.362000 audit: BPF prog-id=142 op=LOAD Oct 29 05:38:57.362000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000300278 items=0 ppid=2495 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:57.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653833343465663737373061633562326563303037623961316538 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit: BPF prog-id=143 op=LOAD Oct 29 05:38:57.363000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003002c8 items=0 ppid=2495 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:57.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653833343465663737373061633562326563303037623961316538 Oct 29 05:38:57.363000 audit: BPF prog-id=143 op=UNLOAD Oct 29 05:38:57.363000 audit: BPF prog-id=142 op=UNLOAD Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:38:57.363000 audit: BPF prog-id=144 op=LOAD Oct 29 05:38:57.363000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000300358 items=0 ppid=2495 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:38:57.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653833343465663737373061633562326563303037623961316538 Oct 29 05:38:57.443490 env[1199]: time="2025-10-29T05:38:57.440374566Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:38:57.520435 env[1199]: time="2025-10-29T05:38:57.520335185Z" level=error msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" failed" error="failed to destroy network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 05:38:57.522544 kubelet[2003]: E1029 05:38:57.522355 2003 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:38:57.524226 kubelet[2003]: E1029 05:38:57.524145 2003 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018"} Oct 29 05:38:57.524330 kubelet[2003]: E1029 05:38:57.524292 2003 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8893c55d-6f83-44df-994b-b713e5abd120\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 05:38:57.526739 kubelet[2003]: E1029 05:38:57.526541 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8893c55d-6f83-44df-994b-b713e5abd120\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:38:57.788553 kubelet[2003]: I1029 05:38:57.788313 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jl4v4" podStartSLOduration=1.233770789 podStartE2EDuration="27.788245944s" podCreationTimestamp="2025-10-29 05:38:30 +0000 UTC" firstStartedPulling="2025-10-29 05:38:30.627492153 +0000 UTC m=+22.526145682" lastFinishedPulling="2025-10-29 05:38:57.181967309 +0000 UTC m=+49.080620837" observedRunningTime="2025-10-29 05:38:57.786952963 +0000 UTC m=+49.685606502" watchObservedRunningTime="2025-10-29 05:38:57.788245944 +0000 UTC m=+49.686899480" Oct 29 05:38:58.185358 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 29 05:38:58.185613 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 29 05:38:58.415290 env[1199]: time="2025-10-29T05:38:58.415216224Z" level=info msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" Oct 29 05:38:58.422809 env[1199]: time="2025-10-29T05:38:58.422752904Z" level=info msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" Oct 29 05:38:58.423140 env[1199]: time="2025-10-29T05:38:58.423085875Z" level=info msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" Oct 29 05:38:58.423732 env[1199]: time="2025-10-29T05:38:58.423696355Z" level=info msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" Oct 29 05:38:58.424487 env[1199]: time="2025-10-29T05:38:58.424450740Z" level=info msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" Oct 29 05:38:58.425029 env[1199]: time="2025-10-29T05:38:58.424993056Z" level=info msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" Oct 29 05:38:58.788783 systemd[1]: run-containerd-runc-k8s.io-c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64-runc.30VdsG.mount: Deactivated successfully. Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.747 [INFO][3229] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.748 [INFO][3229] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" iface="eth0" netns="/var/run/netns/cni-76fc51b9-3206-8f9d-6825-b2a7977d86e3" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.751 [INFO][3229] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" iface="eth0" netns="/var/run/netns/cni-76fc51b9-3206-8f9d-6825-b2a7977d86e3" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.752 [INFO][3229] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" iface="eth0" netns="/var/run/netns/cni-76fc51b9-3206-8f9d-6825-b2a7977d86e3" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.752 [INFO][3229] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:58.752 [INFO][3229] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.261 [INFO][3290] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.262 [INFO][3290] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.262 [INFO][3290] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.287 [WARNING][3290] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.287 [INFO][3290] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.301 [INFO][3290] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.312075 env[1199]: 2025-10-29 05:38:59.308 [INFO][3229] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:38:59.318596 env[1199]: time="2025-10-29T05:38:59.318440115Z" level=info msg="TearDown network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" successfully" Oct 29 05:38:59.316691 systemd[1]: run-netns-cni\x2d76fc51b9\x2d3206\x2d8f9d\x2d6825\x2db2a7977d86e3.mount: Deactivated successfully. Oct 29 05:38:59.318962 env[1199]: time="2025-10-29T05:38:59.318495900Z" level=info msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" returns successfully" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.805 [INFO][3260] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.805 [INFO][3260] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" iface="eth0" netns="/var/run/netns/cni-8e6acac3-753d-9dfa-0826-39da86657c63" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.805 [INFO][3260] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" iface="eth0" netns="/var/run/netns/cni-8e6acac3-753d-9dfa-0826-39da86657c63" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.807 [INFO][3260] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" iface="eth0" netns="/var/run/netns/cni-8e6acac3-753d-9dfa-0826-39da86657c63" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.807 [INFO][3260] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:58.807 [INFO][3260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.261 [INFO][3295] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.262 [INFO][3295] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.301 [INFO][3295] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.325 [WARNING][3295] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.326 [INFO][3295] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.328 [INFO][3295] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.346658 env[1199]: 2025-10-29 05:38:59.344 [INFO][3260] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:38:59.350423 systemd[1]: run-netns-cni\x2d8e6acac3\x2d753d\x2d9dfa\x2d0826\x2d39da86657c63.mount: Deactivated successfully. Oct 29 05:38:59.352530 env[1199]: time="2025-10-29T05:38:59.352459195Z" level=info msg="TearDown network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" successfully" Oct 29 05:38:59.353394 env[1199]: time="2025-10-29T05:38:59.352688640Z" level=info msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" returns successfully" Oct 29 05:38:59.353966 env[1199]: time="2025-10-29T05:38:59.353900643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-tjm6f,Uid:1215c1dc-2e72-4d1b-9366-b75eae9af1f6,Namespace:calico-apiserver,Attempt:1,}" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.954 [INFO][3255] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.955 [INFO][3255] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" iface="eth0" netns="/var/run/netns/cni-6a9c7443-0ea9-2983-1bef-99875b773940" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.955 [INFO][3255] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" iface="eth0" netns="/var/run/netns/cni-6a9c7443-0ea9-2983-1bef-99875b773940" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.956 [INFO][3255] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" iface="eth0" netns="/var/run/netns/cni-6a9c7443-0ea9-2983-1bef-99875b773940" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.957 [INFO][3255] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:58.957 [INFO][3255] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.269 [INFO][3325] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.269 [INFO][3325] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.329 [INFO][3325] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.366 [WARNING][3325] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.366 [INFO][3325] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.383 [INFO][3325] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.389597 env[1199]: 2025-10-29 05:38:59.385 [INFO][3255] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:38:59.403352 systemd[1]: run-netns-cni\x2d6a9c7443\x2d0ea9\x2d2983\x2d1bef\x2d99875b773940.mount: Deactivated successfully. Oct 29 05:38:59.404491 env[1199]: time="2025-10-29T05:38:59.404392508Z" level=info msg="TearDown network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" successfully" Oct 29 05:38:59.404491 env[1199]: time="2025-10-29T05:38:59.404460916Z" level=info msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" returns successfully" Oct 29 05:38:59.408723 env[1199]: time="2025-10-29T05:38:59.408666570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-t6vrc,Uid:43f5bd14-1490-4579-b736-7553352437ec,Namespace:kube-system,Attempt:1,}" Oct 29 05:38:59.424205 env[1199]: time="2025-10-29T05:38:59.424142227Z" level=info msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" Oct 29 05:38:59.470969 kubelet[2003]: I1029 05:38:59.468063 2003 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a16c382-7972-443c-9db3-496964663d75-whisker-ca-bundle\") pod \"0a16c382-7972-443c-9db3-496964663d75\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " Oct 29 05:38:59.470969 kubelet[2003]: I1029 05:38:59.468159 2003 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a16c382-7972-443c-9db3-496964663d75-whisker-backend-key-pair\") pod \"0a16c382-7972-443c-9db3-496964663d75\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " Oct 29 05:38:59.470969 kubelet[2003]: I1029 05:38:59.468209 2003 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-nnhg9\" (UniqueName: \"kubernetes.io/projected/0a16c382-7972-443c-9db3-496964663d75-kube-api-access-nnhg9\") pod \"0a16c382-7972-443c-9db3-496964663d75\" (UID: \"0a16c382-7972-443c-9db3-496964663d75\") " Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.997 [INFO][3254] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.998 [INFO][3254] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" iface="eth0" netns="/var/run/netns/cni-83cc7dd7-32c2-a294-a16f-5b570df0d7ef" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.998 [INFO][3254] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" iface="eth0" netns="/var/run/netns/cni-83cc7dd7-32c2-a294-a16f-5b570df0d7ef" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.998 [INFO][3254] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" iface="eth0" netns="/var/run/netns/cni-83cc7dd7-32c2-a294-a16f-5b570df0d7ef" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.998 [INFO][3254] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:58.998 [INFO][3254] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.293 [INFO][3331] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.301 [INFO][3331] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.383 [INFO][3331] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.414 [WARNING][3331] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.414 [INFO][3331] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.451 [INFO][3331] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.478831 env[1199]: 2025-10-29 05:38:59.471 [INFO][3254] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:38:59.483944 env[1199]: time="2025-10-29T05:38:59.479900319Z" level=info msg="TearDown network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" successfully" Oct 29 05:38:59.483944 env[1199]: time="2025-10-29T05:38:59.482293948Z" level=info msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" returns successfully" Oct 29 05:38:59.485423 kubelet[2003]: I1029 05:38:59.475926 2003 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0a16c382-7972-443c-9db3-496964663d75-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "0a16c382-7972-443c-9db3-496964663d75" (UID: "0a16c382-7972-443c-9db3-496964663d75"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 29 05:38:59.486438 kubelet[2003]: I1029 05:38:59.486401 2003 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0a16c382-7972-443c-9db3-496964663d75-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "0a16c382-7972-443c-9db3-496964663d75" (UID: "0a16c382-7972-443c-9db3-496964663d75"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 29 05:38:59.493737 env[1199]: time="2025-10-29T05:38:59.493675601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-8n95q,Uid:e6ea8502-2cb9-417e-83f2-d0631b0ba769,Namespace:calico-apiserver,Attempt:1,}" Oct 29 05:38:59.497248 kubelet[2003]: I1029 05:38:59.497155 2003 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0a16c382-7972-443c-9db3-496964663d75-kube-api-access-nnhg9" (OuterVolumeSpecName: "kube-api-access-nnhg9") pod "0a16c382-7972-443c-9db3-496964663d75" (UID: "0a16c382-7972-443c-9db3-496964663d75"). InnerVolumeSpecName "kube-api-access-nnhg9". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.745 [INFO][3236] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.747 [INFO][3236] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" iface="eth0" netns="/var/run/netns/cni-00009ece-6d9a-dcc9-c9e0-0e5b198b18bf" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.748 [INFO][3236] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" iface="eth0" netns="/var/run/netns/cni-00009ece-6d9a-dcc9-c9e0-0e5b198b18bf" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.750 [INFO][3236] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" iface="eth0" netns="/var/run/netns/cni-00009ece-6d9a-dcc9-c9e0-0e5b198b18bf" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.750 [INFO][3236] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:58.750 [INFO][3236] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.298 [INFO][3287] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.303 [INFO][3287] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.451 [INFO][3287] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.498 [WARNING][3287] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.498 [INFO][3287] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.523 [INFO][3287] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.533947 env[1199]: 2025-10-29 05:38:59.532 [INFO][3236] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:38:59.537100 env[1199]: time="2025-10-29T05:38:59.537025842Z" level=info msg="TearDown network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" successfully" Oct 29 05:38:59.537355 env[1199]: time="2025-10-29T05:38:59.537319299Z" level=info msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" returns successfully" Oct 29 05:38:59.538498 env[1199]: time="2025-10-29T05:38:59.538459592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8qcp7,Uid:b5e3bce5-6700-4e82-84e0-b76d2b64eb1f,Namespace:kube-system,Attempt:1,}" Oct 29 05:38:59.571962 kubelet[2003]: I1029 05:38:59.571744 2003 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a16c382-7972-443c-9db3-496964663d75-whisker-ca-bundle\") on node \"srv-gd80c.gb1.brightbox.com\" DevicePath \"\"" Oct 29 05:38:59.571962 kubelet[2003]: I1029 05:38:59.571806 2003 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0a16c382-7972-443c-9db3-496964663d75-whisker-backend-key-pair\") on node \"srv-gd80c.gb1.brightbox.com\" DevicePath \"\"" Oct 29 05:38:59.571962 kubelet[2003]: I1029 05:38:59.571827 2003 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-nnhg9\" (UniqueName: \"kubernetes.io/projected/0a16c382-7972-443c-9db3-496964663d75-kube-api-access-nnhg9\") on node \"srv-gd80c.gb1.brightbox.com\" DevicePath \"\"" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.811 [INFO][3240] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.811 [INFO][3240] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" iface="eth0" netns="/var/run/netns/cni-52813b9b-bc48-705c-79c3-0dd2cd090e85" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.824 [INFO][3240] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" iface="eth0" netns="/var/run/netns/cni-52813b9b-bc48-705c-79c3-0dd2cd090e85" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.824 [INFO][3240] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" iface="eth0" netns="/var/run/netns/cni-52813b9b-bc48-705c-79c3-0dd2cd090e85" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.824 [INFO][3240] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:58.825 [INFO][3240] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.318 [INFO][3297] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.320 [INFO][3297] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.524 [INFO][3297] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.549 [WARNING][3297] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.551 [INFO][3297] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.568 [INFO][3297] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:38:59.578239 env[1199]: 2025-10-29 05:38:59.576 [INFO][3240] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:38:59.579220 env[1199]: time="2025-10-29T05:38:59.578379037Z" level=info msg="TearDown network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" successfully" Oct 29 05:38:59.579220 env[1199]: time="2025-10-29T05:38:59.578419153Z" level=info msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" returns successfully" Oct 29 05:38:59.583371 env[1199]: time="2025-10-29T05:38:59.583325697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-nskqc,Uid:c6a0ae0a-392f-42e9-8917-4eeb8b86e85c,Namespace:calico-system,Attempt:1,}" Oct 29 05:38:59.768465 systemd[1]: Removed slice kubepods-besteffort-pod0a16c382_7972_443c_9db3_496964663d75.slice. Oct 29 05:39:00.145687 systemd[1]: Created slice kubepods-besteffort-pod285f16da_2820_4d93_85eb_6ee81d208cf9.slice. Oct 29 05:39:00.183802 kubelet[2003]: I1029 05:39:00.183513 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/285f16da-2820-4d93-85eb-6ee81d208cf9-whisker-backend-key-pair\") pod \"whisker-86f7c596bf-pqnfl\" (UID: \"285f16da-2820-4d93-85eb-6ee81d208cf9\") " pod="calico-system/whisker-86f7c596bf-pqnfl" Oct 29 05:39:00.183802 kubelet[2003]: I1029 05:39:00.183643 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/285f16da-2820-4d93-85eb-6ee81d208cf9-whisker-ca-bundle\") pod \"whisker-86f7c596bf-pqnfl\" (UID: \"285f16da-2820-4d93-85eb-6ee81d208cf9\") " pod="calico-system/whisker-86f7c596bf-pqnfl" Oct 29 05:39:00.183802 kubelet[2003]: I1029 05:39:00.183691 2003 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zfk8n\" (UniqueName: \"kubernetes.io/projected/285f16da-2820-4d93-85eb-6ee81d208cf9-kube-api-access-zfk8n\") pod \"whisker-86f7c596bf-pqnfl\" (UID: \"285f16da-2820-4d93-85eb-6ee81d208cf9\") " pod="calico-system/whisker-86f7c596bf-pqnfl" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.905 [INFO][3359] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.905 [INFO][3359] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" iface="eth0" netns="/var/run/netns/cni-fcba7486-5016-80a8-1805-ab36abacec44" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.906 [INFO][3359] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" iface="eth0" netns="/var/run/netns/cni-fcba7486-5016-80a8-1805-ab36abacec44" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.907 [INFO][3359] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" iface="eth0" netns="/var/run/netns/cni-fcba7486-5016-80a8-1805-ab36abacec44" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.907 [INFO][3359] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:38:59.907 [INFO][3359] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.180 [INFO][3427] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.180 [INFO][3427] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.180 [INFO][3427] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.201 [WARNING][3427] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.202 [INFO][3427] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.204 [INFO][3427] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:00.222082 env[1199]: 2025-10-29 05:39:00.208 [INFO][3359] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:00.223672 env[1199]: time="2025-10-29T05:39:00.223605157Z" level=info msg="TearDown network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" successfully" Oct 29 05:39:00.223829 env[1199]: time="2025-10-29T05:39:00.223790900Z" level=info msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" returns successfully" Oct 29 05:39:00.226336 env[1199]: time="2025-10-29T05:39:00.226296003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5lk8x,Uid:5092f51d-06fc-4dab-b0c4-32dc46cf7538,Namespace:calico-system,Attempt:1,}" Oct 29 05:39:00.325670 systemd[1]: run-netns-cni\x2dfcba7486\x2d5016\x2d80a8\x2d1805\x2dab36abacec44.mount: Deactivated successfully. Oct 29 05:39:00.325836 systemd[1]: run-netns-cni\x2d52813b9b\x2dbc48\x2d705c\x2d79c3\x2d0dd2cd090e85.mount: Deactivated successfully. Oct 29 05:39:00.333030 systemd[1]: run-netns-cni\x2d83cc7dd7\x2d32c2\x2da294\x2da16f\x2d5b570df0d7ef.mount: Deactivated successfully. Oct 29 05:39:00.333209 systemd[1]: run-netns-cni\x2d00009ece\x2d6d9a\x2ddcc9\x2dc9e0\x2d0e5b198b18bf.mount: Deactivated successfully. Oct 29 05:39:00.333334 systemd[1]: var-lib-kubelet-pods-0a16c382\x2d7972\x2d443c\x2d9db3\x2d496964663d75-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dnnhg9.mount: Deactivated successfully. Oct 29 05:39:00.333473 systemd[1]: var-lib-kubelet-pods-0a16c382\x2d7972\x2d443c\x2d9db3\x2d496964663d75-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 29 05:39:00.411261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 05:39:00.411864 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8b703503c0: link becomes ready Oct 29 05:39:00.450975 env[1199]: time="2025-10-29T05:39:00.450890680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-86f7c596bf-pqnfl,Uid:285f16da-2820-4d93-85eb-6ee81d208cf9,Namespace:calico-system,Attempt:0,}" Oct 29 05:39:00.470276 kubelet[2003]: I1029 05:39:00.468278 2003 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0a16c382-7972-443c-9db3-496964663d75" path="/var/lib/kubelet/pods/0a16c382-7972-443c-9db3-496964663d75/volumes" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:38:59.887 [INFO][3367] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:38:59.950 [INFO][3367] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0 coredns-674b8bbfcf- kube-system 43f5bd14-1490-4579-b736-7553352437ec 911 0 2025-10-29 05:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com coredns-674b8bbfcf-t6vrc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia8b703503c0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:38:59.950 [INFO][3367] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.203 [INFO][3442] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" HandleID="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.214 [INFO][3442] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" HandleID="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e6b0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-t6vrc", "timestamp":"2025-10-29 05:39:00.203934314 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.214 [INFO][3442] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.214 [INFO][3442] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.214 [INFO][3442] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.237 [INFO][3442] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.261 [INFO][3442] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.281 [INFO][3442] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.293 [INFO][3442] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.320 [INFO][3442] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.320 [INFO][3442] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.326 [INFO][3442] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.343 [INFO][3442] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.370 [INFO][3442] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.129/26] block=192.168.119.128/26 handle="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.370 [INFO][3442] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.129/26] handle="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.370 [INFO][3442] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:00.470499 env[1199]: 2025-10-29 05:39:00.370 [INFO][3442] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.129/26] IPv6=[] ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" HandleID="k8s-pod-network.3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.475044 env[1199]: 2025-10-29 05:39:00.376 [INFO][3367] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"43f5bd14-1490-4579-b736-7553352437ec", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-t6vrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia8b703503c0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.475044 env[1199]: 2025-10-29 05:39:00.377 [INFO][3367] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.129/32] ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.475044 env[1199]: 2025-10-29 05:39:00.377 [INFO][3367] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia8b703503c0 ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.475044 env[1199]: 2025-10-29 05:39:00.413 [INFO][3367] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.475044 env[1199]: 2025-10-29 05:39:00.415 [INFO][3367] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"43f5bd14-1490-4579-b736-7553352437ec", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c", Pod:"coredns-674b8bbfcf-t6vrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia8b703503c0", MAC:"8e:21:5d:88:79:72", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.475519 env[1199]: 2025-10-29 05:39:00.462 [INFO][3367] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c" Namespace="kube-system" Pod="coredns-674b8bbfcf-t6vrc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:00.485539 systemd-networkd[1026]: calia8b703503c0: Link UP Oct 29 05:39:00.490903 systemd-networkd[1026]: calia8b703503c0: Gained carrier Oct 29 05:39:00.561841 env[1199]: time="2025-10-29T05:39:00.561079016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:00.561841 env[1199]: time="2025-10-29T05:39:00.561482789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:00.561841 env[1199]: time="2025-10-29T05:39:00.561537195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:00.565612 env[1199]: time="2025-10-29T05:39:00.563677116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c pid=3505 runtime=io.containerd.runc.v2 Oct 29 05:39:00.616049 systemd-networkd[1026]: cali8f0cc806954: Link UP Oct 29 05:39:00.620821 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f0cc806954: link becomes ready Oct 29 05:39:00.621596 systemd-networkd[1026]: cali8f0cc806954: Gained carrier Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:38:59.842 [INFO][3395] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:38:59.880 [INFO][3395] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0 goldmane-666569f655- calico-system c6a0ae0a-392f-42e9-8917-4eeb8b86e85c 910 0 2025-10-29 05:38:27 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com goldmane-666569f655-nskqc eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali8f0cc806954 [] [] }} ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:38:59.880 [INFO][3395] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.246 [INFO][3435] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" HandleID="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.246 [INFO][3435] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" HandleID="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005b01f0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"goldmane-666569f655-nskqc", "timestamp":"2025-10-29 05:39:00.246130192 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.274 [INFO][3435] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.371 [INFO][3435] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.371 [INFO][3435] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.399 [INFO][3435] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.451 [INFO][3435] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.495 [INFO][3435] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.506 [INFO][3435] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.521 [INFO][3435] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.524 [INFO][3435] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.533 [INFO][3435] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43 Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.549 [INFO][3435] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.566 [INFO][3435] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.130/26] block=192.168.119.128/26 handle="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.566 [INFO][3435] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.130/26] handle="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.566 [INFO][3435] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:00.682334 env[1199]: 2025-10-29 05:39:00.566 [INFO][3435] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.130/26] IPv6=[] ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" HandleID="k8s-pod-network.1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.584 [INFO][3395] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-666569f655-nskqc", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.119.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8f0cc806954", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.584 [INFO][3395] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.130/32] ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.584 [INFO][3395] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f0cc806954 ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.620 [INFO][3395] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.624 [INFO][3395] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43", Pod:"goldmane-666569f655-nskqc", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.119.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8f0cc806954", MAC:"aa:30:83:cc:b5:cf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.683788 env[1199]: 2025-10-29 05:39:00.654 [INFO][3395] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43" Namespace="calico-system" Pod="goldmane-666569f655-nskqc" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:00.744810 systemd[1]: Started cri-containerd-3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c.scope. Oct 29 05:39:00.772969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a3d2e4143c: link becomes ready Oct 29 05:39:00.772966 systemd-networkd[1026]: cali9a3d2e4143c: Link UP Oct 29 05:39:00.773270 systemd-networkd[1026]: cali9a3d2e4143c: Gained carrier Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:38:59.830 [INFO][3357] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:38:59.934 [INFO][3357] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0 calico-apiserver-779769bb48- calico-apiserver 1215c1dc-2e72-4d1b-9366-b75eae9af1f6 909 0 2025-10-29 05:38:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:779769bb48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com calico-apiserver-779769bb48-tjm6f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9a3d2e4143c [] [] }} ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:38:59.934 [INFO][3357] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.308 [INFO][3447] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" HandleID="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.308 [INFO][3447] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" HandleID="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad810), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-gd80c.gb1.brightbox.com", "pod":"calico-apiserver-779769bb48-tjm6f", "timestamp":"2025-10-29 05:39:00.308404727 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.308 [INFO][3447] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.567 [INFO][3447] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.567 [INFO][3447] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.646 [INFO][3447] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.666 [INFO][3447] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.680 [INFO][3447] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.685 [INFO][3447] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.690 [INFO][3447] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.690 [INFO][3447] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.694 [INFO][3447] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5 Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.704 [INFO][3447] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.722 [INFO][3447] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.131/26] block=192.168.119.128/26 handle="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.722 [INFO][3447] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.131/26] handle="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.816747 env[1199]: 2025-10-29 05:39:00.722 [INFO][3447] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.722 [INFO][3447] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.131/26] IPv6=[] ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" HandleID="k8s-pod-network.888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.755 [INFO][3357] cni-plugin/k8s.go 418: Populated endpoint ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"1215c1dc-2e72-4d1b-9366-b75eae9af1f6", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-779769bb48-tjm6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a3d2e4143c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.755 [INFO][3357] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.131/32] ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.755 [INFO][3357] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9a3d2e4143c ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.786 [INFO][3357] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.818098 env[1199]: 2025-10-29 05:39:00.796 [INFO][3357] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"1215c1dc-2e72-4d1b-9366-b75eae9af1f6", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5", Pod:"calico-apiserver-779769bb48-tjm6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a3d2e4143c", MAC:"aa:0d:ea:65:9d:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.819018 env[1199]: 2025-10-29 05:39:00.813 [INFO][3357] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-tjm6f" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.834000 audit: BPF prog-id=145 op=LOAD Oct 29 05:39:00.836000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.836000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3505 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:00.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383236353664656561313631333436333262613832656361613061 Oct 29 05:39:00.836000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.836000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3505 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:00.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383236353664656561313631333436333262613832656361613061 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit: BPF prog-id=146 op=LOAD Oct 29 05:39:00.838000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002861b0 items=0 ppid=3505 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:00.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383236353664656561313631333436333262613832656361613061 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit: BPF prog-id=147 op=LOAD Oct 29 05:39:00.838000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002861f8 items=0 ppid=3505 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:00.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383236353664656561313631333436333262613832656361613061 Oct 29 05:39:00.838000 audit: BPF prog-id=147 op=UNLOAD Oct 29 05:39:00.838000 audit: BPF prog-id=146 op=UNLOAD Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { perfmon } for pid=3519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit[3519]: AVC avc: denied { bpf } for pid=3519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:00.838000 audit: BPF prog-id=148 op=LOAD Oct 29 05:39:00.838000 audit[3519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000286608 items=0 ppid=3505 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:00.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383236353664656561313631333436333262613832656361613061 Oct 29 05:39:00.856943 env[1199]: time="2025-10-29T05:39:00.856818856Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:00.857357 env[1199]: time="2025-10-29T05:39:00.857294660Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:00.857874 env[1199]: time="2025-10-29T05:39:00.857550669Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:00.858976 env[1199]: time="2025-10-29T05:39:00.858555833Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43 pid=3573 runtime=io.containerd.runc.v2 Oct 29 05:39:00.899605 systemd-networkd[1026]: calib432d055b16: Link UP Oct 29 05:39:00.902025 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib432d055b16: link becomes ready Oct 29 05:39:00.902224 systemd-networkd[1026]: calib432d055b16: Gained carrier Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:38:59.919 [INFO][3373] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:38:59.976 [INFO][3373] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0 calico-apiserver-779769bb48- calico-apiserver e6ea8502-2cb9-417e-83f2-d0631b0ba769 913 0 2025-10-29 05:38:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:779769bb48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com calico-apiserver-779769bb48-8n95q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib432d055b16 [] [] }} ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:38:59.977 [INFO][3373] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.498 [INFO][3450] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" HandleID="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.501 [INFO][3450] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" HandleID="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4040), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-gd80c.gb1.brightbox.com", "pod":"calico-apiserver-779769bb48-8n95q", "timestamp":"2025-10-29 05:39:00.498852997 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.501 [INFO][3450] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.729 [INFO][3450] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.729 [INFO][3450] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.776 [INFO][3450] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.787 [INFO][3450] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.808 [INFO][3450] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.823 [INFO][3450] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.833 [INFO][3450] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.839 [INFO][3450] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.853 [INFO][3450] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829 Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.861 [INFO][3450] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.874 [INFO][3450] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.132/26] block=192.168.119.128/26 handle="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.874 [INFO][3450] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.132/26] handle="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:00.942109 env[1199]: 2025-10-29 05:39:00.874 [INFO][3450] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.874 [INFO][3450] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.132/26] IPv6=[] ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" HandleID="k8s-pod-network.227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.880 [INFO][3373] cni-plugin/k8s.go 418: Populated endpoint ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e6ea8502-2cb9-417e-83f2-d0631b0ba769", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-779769bb48-8n95q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib432d055b16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.880 [INFO][3373] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.132/32] ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.880 [INFO][3373] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib432d055b16 ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.905 [INFO][3373] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.943444 env[1199]: 2025-10-29 05:39:00.905 [INFO][3373] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e6ea8502-2cb9-417e-83f2-d0631b0ba769", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829", Pod:"calico-apiserver-779769bb48-8n95q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib432d055b16", MAC:"26:72:c5:99:67:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:00.943849 env[1199]: 2025-10-29 05:39:00.939 [INFO][3373] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829" Namespace="calico-apiserver" Pod="calico-apiserver-779769bb48-8n95q" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:00.984809 env[1199]: time="2025-10-29T05:39:00.984006089Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:00.984809 env[1199]: time="2025-10-29T05:39:00.984169041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:00.984809 env[1199]: time="2025-10-29T05:39:00.984231217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:00.984809 env[1199]: time="2025-10-29T05:39:00.984507428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5 pid=3602 runtime=io.containerd.runc.v2 Oct 29 05:39:00.994650 systemd[1]: Started cri-containerd-1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43.scope. Oct 29 05:39:01.034071 systemd-networkd[1026]: califbfb9f4ff2b: Link UP Oct 29 05:39:01.050402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califbfb9f4ff2b: link becomes ready Oct 29 05:39:01.051603 systemd-networkd[1026]: califbfb9f4ff2b: Gained carrier Oct 29 05:39:01.090852 env[1199]: time="2025-10-29T05:39:01.089584686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-t6vrc,Uid:43f5bd14-1490-4579-b736-7553352437ec,Namespace:kube-system,Attempt:1,} returns sandbox id \"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c\"" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.029 [INFO][3393] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.101 [INFO][3393] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0 coredns-674b8bbfcf- kube-system b5e3bce5-6700-4e82-84e0-b76d2b64eb1f 908 0 2025-10-29 05:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com coredns-674b8bbfcf-8qcp7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califbfb9f4ff2b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.101 [INFO][3393] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.689 [INFO][3464] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" HandleID="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.690 [INFO][3464] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" HandleID="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000352830), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-8qcp7", "timestamp":"2025-10-29 05:39:00.689983694 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.690 [INFO][3464] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.874 [INFO][3464] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.874 [INFO][3464] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.916 [INFO][3464] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.938 [INFO][3464] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.950 [INFO][3464] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.954 [INFO][3464] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.960 [INFO][3464] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.960 [INFO][3464] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.965 [INFO][3464] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121 Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.972 [INFO][3464] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:00.999 [INFO][3464] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.133/26] block=192.168.119.128/26 handle="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:01.000 [INFO][3464] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.133/26] handle="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:01.000 [INFO][3464] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:01.096227 env[1199]: 2025-10-29 05:39:01.000 [INFO][3464] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.133/26] IPv6=[] ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" HandleID="k8s-pod-network.05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.099798 env[1199]: 2025-10-29 05:39:01.004 [INFO][3393] cni-plugin/k8s.go 418: Populated endpoint ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-8qcp7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califbfb9f4ff2b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.099798 env[1199]: 2025-10-29 05:39:01.005 [INFO][3393] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.133/32] ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.099798 env[1199]: 2025-10-29 05:39:01.005 [INFO][3393] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califbfb9f4ff2b ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.099798 env[1199]: 2025-10-29 05:39:01.060 [INFO][3393] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.099798 env[1199]: 2025-10-29 05:39:01.070 [INFO][3393] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121", Pod:"coredns-674b8bbfcf-8qcp7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califbfb9f4ff2b", MAC:"ea:6a:3f:2b:44:46", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.100542 env[1199]: 2025-10-29 05:39:01.090 [INFO][3393] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121" Namespace="kube-system" Pod="coredns-674b8bbfcf-8qcp7" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:01.105991 env[1199]: time="2025-10-29T05:39:01.105896800Z" level=info msg="CreateContainer within sandbox \"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.116000 audit: BPF prog-id=149 op=LOAD Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3573 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163393330386635353162343866633937613562313837336532633735 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3573 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163393330386635353162343866633937613562313837336532633735 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit: BPF prog-id=150 op=LOAD Oct 29 05:39:01.117000 audit[3591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032b370 items=0 ppid=3573 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163393330386635353162343866633937613562313837336532633735 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit: BPF prog-id=151 op=LOAD Oct 29 05:39:01.117000 audit[3591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032b3b8 items=0 ppid=3573 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163393330386635353162343866633937613562313837336532633735 Oct 29 05:39:01.117000 audit: BPF prog-id=151 op=UNLOAD Oct 29 05:39:01.117000 audit: BPF prog-id=150 op=UNLOAD Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.117000 audit: BPF prog-id=152 op=LOAD Oct 29 05:39:01.117000 audit[3591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032b7c8 items=0 ppid=3573 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163393330386635353162343866633937613562313837336532633735 Oct 29 05:39:01.166492 env[1199]: time="2025-10-29T05:39:01.163390906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:01.166492 env[1199]: time="2025-10-29T05:39:01.163638234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:01.166492 env[1199]: time="2025-10-29T05:39:01.163710829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:01.166185 systemd[1]: Started cri-containerd-888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5.scope. Oct 29 05:39:01.176327 env[1199]: time="2025-10-29T05:39:01.176213725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829 pid=3645 runtime=io.containerd.runc.v2 Oct 29 05:39:01.197346 env[1199]: time="2025-10-29T05:39:01.197270946Z" level=info msg="CreateContainer within sandbox \"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9a5f8a64dd94492a755c550b53f3a71014495ae36b7a4ddc397e517abe0fdaa1\"" Oct 29 05:39:01.198435 env[1199]: time="2025-10-29T05:39:01.198376365Z" level=info msg="StartContainer for \"9a5f8a64dd94492a755c550b53f3a71014495ae36b7a4ddc397e517abe0fdaa1\"" Oct 29 05:39:01.229482 systemd-networkd[1026]: cali99421d4bd95: Link UP Oct 29 05:39:01.237443 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali99421d4bd95: link becomes ready Oct 29 05:39:01.236700 systemd-networkd[1026]: cali99421d4bd95: Gained carrier Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.239000 audit: BPF prog-id=153 op=LOAD Oct 29 05:39:01.240000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.240000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3602 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386466623761633530663139396161316437303963656262346436 Oct 29 05:39:01.240000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.240000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3602 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386466623761633530663139396161316437303963656262346436 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.241000 audit: BPF prog-id=154 op=LOAD Oct 29 05:39:01.241000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028aac0 items=0 ppid=3602 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386466623761633530663139396161316437303963656262346436 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit: BPF prog-id=155 op=LOAD Oct 29 05:39:01.242000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ab08 items=0 ppid=3602 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386466623761633530663139396161316437303963656262346436 Oct 29 05:39:01.242000 audit: BPF prog-id=155 op=UNLOAD Oct 29 05:39:01.242000 audit: BPF prog-id=154 op=UNLOAD Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.242000 audit: BPF prog-id=156 op=LOAD Oct 29 05:39:01.242000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028af18 items=0 ppid=3602 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386466623761633530663139396161316437303963656262346436 Oct 29 05:39:01.283010 env[1199]: time="2025-10-29T05:39:01.279257623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:01.283010 env[1199]: time="2025-10-29T05:39:01.279327985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:01.283010 env[1199]: time="2025-10-29T05:39:01.279345866Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:01.283010 env[1199]: time="2025-10-29T05:39:01.279543118Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121 pid=3711 runtime=io.containerd.runc.v2 Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.503 [INFO][3475] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.656 [INFO][3475] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0 csi-node-driver- calico-system 5092f51d-06fc-4dab-b0c4-32dc46cf7538 926 0 2025-10-29 05:38:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com csi-node-driver-5lk8x eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali99421d4bd95 [] [] }} ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.656 [INFO][3475] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.956 [INFO][3539] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" HandleID="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.976 [INFO][3539] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" HandleID="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cc530), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"csi-node-driver-5lk8x", "timestamp":"2025-10-29 05:39:00.956859882 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:00.976 [INFO][3539] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.006 [INFO][3539] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.006 [INFO][3539] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.056 [INFO][3539] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.116 [INFO][3539] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.138 [INFO][3539] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.147 [INFO][3539] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.161 [INFO][3539] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.161 [INFO][3539] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.172 [INFO][3539] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.185 [INFO][3539] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.203 [INFO][3539] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.134/26] block=192.168.119.128/26 handle="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.204 [INFO][3539] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.134/26] handle="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.204 [INFO][3539] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:01.288323 env[1199]: 2025-10-29 05:39:01.204 [INFO][3539] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.134/26] IPv6=[] ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" HandleID="k8s-pod-network.e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.209 [INFO][3475] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5092f51d-06fc-4dab-b0c4-32dc46cf7538", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-5lk8x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99421d4bd95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.210 [INFO][3475] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.134/32] ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.210 [INFO][3475] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali99421d4bd95 ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.239 [INFO][3475] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.240 [INFO][3475] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5092f51d-06fc-4dab-b0c4-32dc46cf7538", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a", Pod:"csi-node-driver-5lk8x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99421d4bd95", MAC:"72:41:a5:14:5b:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.289533 env[1199]: 2025-10-29 05:39:01.278 [INFO][3475] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a" Namespace="calico-system" Pod="csi-node-driver-5lk8x" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:01.339636 systemd[1]: run-containerd-runc-k8s.io-227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829-runc.02vLiz.mount: Deactivated successfully. Oct 29 05:39:01.365047 systemd[1]: Started cri-containerd-227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829.scope. Oct 29 05:39:01.438048 env[1199]: time="2025-10-29T05:39:01.437980032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-nskqc,Uid:c6a0ae0a-392f-42e9-8917-4eeb8b86e85c,Namespace:calico-system,Attempt:1,} returns sandbox id \"1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43\"" Oct 29 05:39:01.440972 env[1199]: time="2025-10-29T05:39:01.440873363Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 05:39:01.464355 systemd[1]: Started cri-containerd-9a5f8a64dd94492a755c550b53f3a71014495ae36b7a4ddc397e517abe0fdaa1.scope. Oct 29 05:39:01.484000 env[1199]: time="2025-10-29T05:39:01.483422260Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:01.484000 env[1199]: time="2025-10-29T05:39:01.483756693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:01.494610 env[1199]: time="2025-10-29T05:39:01.489700982Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:01.494610 env[1199]: time="2025-10-29T05:39:01.490223248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a pid=3789 runtime=io.containerd.runc.v2 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.496000 audit: BPF prog-id=157 op=LOAD Oct 29 05:39:01.497000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.497000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3645 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232376363383932626166313235636362363639333364383237653834 Oct 29 05:39:01.498000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.498000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3645 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232376363383932626166313235636362363639333364383237653834 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.501000 audit: BPF prog-id=158 op=LOAD Oct 29 05:39:01.501000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024ff0 items=0 ppid=3645 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232376363383932626166313235636362363639333364383237653834 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.502000 audit: BPF prog-id=159 op=LOAD Oct 29 05:39:01.502000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025038 items=0 ppid=3645 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232376363383932626166313235636362363639333364383237653834 Oct 29 05:39:01.505000 audit: BPF prog-id=159 op=UNLOAD Oct 29 05:39:01.505000 audit: BPF prog-id=158 op=UNLOAD Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.505000 audit: BPF prog-id=160 op=LOAD Oct 29 05:39:01.505000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025448 items=0 ppid=3645 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232376363383932626166313235636362363639333364383237653834 Oct 29 05:39:01.515634 env[1199]: time="2025-10-29T05:39:01.515576398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-tjm6f,Uid:1215c1dc-2e72-4d1b-9366-b75eae9af1f6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5\"" Oct 29 05:39:01.561985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 05:39:01.568570 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2dd3a6f2960: link becomes ready Oct 29 05:39:01.564560 systemd[1]: Started cri-containerd-05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121.scope. Oct 29 05:39:01.567146 systemd-networkd[1026]: cali2dd3a6f2960: Link UP Oct 29 05:39:01.567542 systemd-networkd[1026]: cali2dd3a6f2960: Gained carrier Oct 29 05:39:01.586208 systemd[1]: Started cri-containerd-e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a.scope. Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.590000 audit: BPF prog-id=161 op=LOAD Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3505 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356638613634646439343439326137353563353530623533663361 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3505 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356638613634646439343439326137353563353530623533663361 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit: BPF prog-id=162 op=LOAD Oct 29 05:39:01.592000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cdb90 items=0 ppid=3505 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356638613634646439343439326137353563353530623533663361 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit: BPF prog-id=163 op=LOAD Oct 29 05:39:01.592000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cdbd8 items=0 ppid=3505 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356638613634646439343439326137353563353530623533663361 Oct 29 05:39:01.592000 audit: BPF prog-id=163 op=UNLOAD Oct 29 05:39:01.592000 audit: BPF prog-id=162 op=UNLOAD Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.592000 audit: BPF prog-id=164 op=LOAD Oct 29 05:39:01.592000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cdfe8 items=0 ppid=3505 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356638613634646439343439326137353563353530623533663361 Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:00.711 [INFO][3513] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:00.799 [INFO][3513] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0 whisker-86f7c596bf- calico-system 285f16da-2820-4d93-85eb-6ee81d208cf9 941 0 2025-10-29 05:38:59 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:86f7c596bf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com whisker-86f7c596bf-pqnfl eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali2dd3a6f2960 [] [] }} ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:00.799 [INFO][3513] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.260 [INFO][3575] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" HandleID="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.261 [INFO][3575] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" HandleID="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000223a40), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"whisker-86f7c596bf-pqnfl", "timestamp":"2025-10-29 05:39:01.26093244 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.261 [INFO][3575] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.261 [INFO][3575] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.261 [INFO][3575] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.368 [INFO][3575] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.400 [INFO][3575] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.424 [INFO][3575] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.430 [INFO][3575] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.438 [INFO][3575] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.439 [INFO][3575] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.450 [INFO][3575] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.457 [INFO][3575] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.483 [INFO][3575] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.135/26] block=192.168.119.128/26 handle="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.483 [INFO][3575] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.135/26] handle="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.483 [INFO][3575] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:01.625367 env[1199]: 2025-10-29 05:39:01.483 [INFO][3575] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.135/26] IPv6=[] ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" HandleID="k8s-pod-network.bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.627000 audit: BPF prog-id=165 op=LOAD Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3711 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333038393633636665633831616334313131336162336665366332 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3711 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333038393633636665633831616334313131336162336665366332 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.630000 audit: BPF prog-id=166 op=LOAD Oct 29 05:39:01.630000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025360 items=0 ppid=3711 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333038393633636665633831616334313131336162336665366332 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit: BPF prog-id=167 op=LOAD Oct 29 05:39:01.631000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253a8 items=0 ppid=3711 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333038393633636665633831616334313131336162336665366332 Oct 29 05:39:01.631000 audit: BPF prog-id=167 op=UNLOAD Oct 29 05:39:01.631000 audit: BPF prog-id=166 op=UNLOAD Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.631000 audit: BPF prog-id=168 op=LOAD Oct 29 05:39:01.631000 audit[3741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257b8 items=0 ppid=3711 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333038393633636665633831616334313131336162336665366332 Oct 29 05:39:01.654000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:01.654000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017abfc0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:01.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:01.655000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:01.655000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b983c0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:01.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.512 [INFO][3513] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0", GenerateName:"whisker-86f7c596bf-", Namespace:"calico-system", SelfLink:"", UID:"285f16da-2820-4d93-85eb-6ee81d208cf9", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"86f7c596bf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"whisker-86f7c596bf-pqnfl", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.119.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali2dd3a6f2960", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.512 [INFO][3513] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.135/32] ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.512 [INFO][3513] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2dd3a6f2960 ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.567 [INFO][3513] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.568 [INFO][3513] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0", GenerateName:"whisker-86f7c596bf-", Namespace:"calico-system", SelfLink:"", UID:"285f16da-2820-4d93-85eb-6ee81d208cf9", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"86f7c596bf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e", Pod:"whisker-86f7c596bf-pqnfl", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.119.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali2dd3a6f2960", MAC:"26:d6:8f:4d:25:24", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:01.669444 env[1199]: 2025-10-29 05:39:01.621 [INFO][3513] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e" Namespace="calico-system" Pod="whisker-86f7c596bf-pqnfl" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--86f7c596bf--pqnfl-eth0" Oct 29 05:39:01.669444 env[1199]: time="2025-10-29T05:39:01.646612488Z" level=info msg="StartContainer for \"9a5f8a64dd94492a755c550b53f3a71014495ae36b7a4ddc397e517abe0fdaa1\" returns successfully" Oct 29 05:39:01.666221 systemd-networkd[1026]: calia8b703503c0: Gained IPv6LL Oct 29 05:39:01.705935 env[1199]: time="2025-10-29T05:39:01.705780973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:01.705935 env[1199]: time="2025-10-29T05:39:01.705869321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:01.706273 env[1199]: time="2025-10-29T05:39:01.705888413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:01.706273 env[1199]: time="2025-10-29T05:39:01.706114489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e pid=3859 runtime=io.containerd.runc.v2 Oct 29 05:39:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.735000 audit: BPF prog-id=169 op=LOAD Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3789 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536373464623336663930653637396164396261636236303165386163 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3789 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536373464623336663930653637396164396261636236303165386163 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit: BPF prog-id=170 op=LOAD Oct 29 05:39:01.736000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002b7610 items=0 ppid=3789 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536373464623336663930653637396164396261636236303165386163 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit: BPF prog-id=171 op=LOAD Oct 29 05:39:01.736000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002b7658 items=0 ppid=3789 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536373464623336663930653637396164396261636236303165386163 Oct 29 05:39:01.736000 audit: BPF prog-id=171 op=UNLOAD Oct 29 05:39:01.736000 audit: BPF prog-id=170 op=UNLOAD Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:01.736000 audit: BPF prog-id=172 op=LOAD Oct 29 05:39:01.736000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002b7a68 items=0 ppid=3789 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536373464623336663930653637396164396261636236303165386163 Oct 29 05:39:01.774498 env[1199]: time="2025-10-29T05:39:01.774436747Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:01.784689 env[1199]: time="2025-10-29T05:39:01.784523246Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 05:39:01.794100 kubelet[2003]: E1029 05:39:01.794019 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:01.794783 kubelet[2003]: E1029 05:39:01.794107 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:01.795588 env[1199]: time="2025-10-29T05:39:01.795510510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:01.832167 kubelet[2003]: E1029 05:39:01.831153 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-b9gfx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:01.833445 kubelet[2003]: E1029 05:39:01.833313 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:01.841150 systemd[1]: Started cri-containerd-bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e.scope. Oct 29 05:39:01.855267 env[1199]: time="2025-10-29T05:39:01.855103743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8qcp7,Uid:b5e3bce5-6700-4e82-84e0-b76d2b64eb1f,Namespace:kube-system,Attempt:1,} returns sandbox id \"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121\"" Oct 29 05:39:01.873143 env[1199]: time="2025-10-29T05:39:01.873074414Z" level=info msg="CreateContainer within sandbox \"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 29 05:39:01.910000 audit[3925]: AVC avc: denied { write } for pid=3925 comm="tee" name="fd" dev="proc" ino=31361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:01.910000 audit[3925]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc90f8a7b5 a2=241 a3=1b6 items=1 ppid=3710 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.910000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 29 05:39:01.910000 audit: PATH item=0 name="/dev/fd/63" inode=31358 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:01.910000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:01.922000 audit[3928]: AVC avc: denied { write } for pid=3928 comm="tee" name="fd" dev="proc" ino=31788 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:01.922000 audit[3928]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff17fbf7b6 a2=241 a3=1b6 items=1 ppid=3692 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:01.922000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 29 05:39:01.922000 audit: PATH item=0 name="/dev/fd/63" inode=31785 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:01.924843 env[1199]: time="2025-10-29T05:39:01.924749928Z" level=info msg="CreateContainer within sandbox \"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"03abedb24e044dcd33b93e1d08a4a954d7869b173a012971f7c42f26212648f9\"" Oct 29 05:39:01.929078 env[1199]: time="2025-10-29T05:39:01.929026177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-779769bb48-8n95q,Uid:e6ea8502-2cb9-417e-83f2-d0631b0ba769,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829\"" Oct 29 05:39:01.931531 env[1199]: time="2025-10-29T05:39:01.931492763Z" level=info msg="StartContainer for \"03abedb24e044dcd33b93e1d08a4a954d7869b173a012971f7c42f26212648f9\"" Oct 29 05:39:01.922000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:01.951079 env[1199]: time="2025-10-29T05:39:01.951025204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5lk8x,Uid:5092f51d-06fc-4dab-b0c4-32dc46cf7538,Namespace:calico-system,Attempt:1,} returns sandbox id \"e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a\"" Oct 29 05:39:01.974589 systemd[1]: Started cri-containerd-03abedb24e044dcd33b93e1d08a4a954d7869b173a012971f7c42f26212648f9.scope. Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.012000 audit: BPF prog-id=173 op=LOAD Oct 29 05:39:02.014000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.014000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3711 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616265646232346530343464636433336239336531643038613461 Oct 29 05:39:02.014000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.014000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3711 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616265646232346530343464636433336239336531643038613461 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.015000 audit: BPF prog-id=174 op=LOAD Oct 29 05:39:02.015000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255d20 items=0 ppid=3711 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616265646232346530343464636433336239336531643038613461 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.016000 audit: BPF prog-id=175 op=LOAD Oct 29 05:39:02.016000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d68 items=0 ppid=3711 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616265646232346530343464636433336239336531643038613461 Oct 29 05:39:02.017000 audit: BPF prog-id=175 op=UNLOAD Oct 29 05:39:02.018000 audit: BPF prog-id=174 op=UNLOAD Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.018000 audit: BPF prog-id=176 op=LOAD Oct 29 05:39:02.018000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0178 items=0 ppid=3711 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616265646232346530343464636433336239336531643038613461 Oct 29 05:39:02.038000 audit[3807]: AVC avc: denied { getattr } for pid=3807 comm="coredns" path="cgroup:[4026532868]" dev="nsfs" ino=4026532868 scontext=system_u:system_r:svirt_lxc_net_t:s0:c518,c569 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 29 05:39:02.038000 audit[3807]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a480 a2=c0000d9628 a3=0 items=0 ppid=3505 pid=3807 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c518,c569 key=(null) Oct 29 05:39:02.038000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 29 05:39:02.046616 env[1199]: time="2025-10-29T05:39:02.046560115Z" level=info msg="StartContainer for \"03abedb24e044dcd33b93e1d08a4a954d7869b173a012971f7c42f26212648f9\" returns successfully" Oct 29 05:39:02.086000 audit[3953]: AVC avc: denied { getattr } for pid=3953 comm="coredns" path="cgroup:[4026532881]" dev="nsfs" ino=4026532881 scontext=system_u:system_r:svirt_lxc_net_t:s0:c588,c696 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 29 05:39:02.086000 audit[3953]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a8b8 a2=c0004a9628 a3=0 items=0 ppid=3711 pid=3953 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c588,c696 key=(null) Oct 29 05:39:02.086000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 29 05:39:02.109537 env[1199]: time="2025-10-29T05:39:02.109370915Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:02.110755 env[1199]: time="2025-10-29T05:39:02.110699613Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:02.112162 kubelet[2003]: E1029 05:39:02.112072 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:02.112337 kubelet[2003]: E1029 05:39:02.112181 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:02.113049 env[1199]: time="2025-10-29T05:39:02.112979639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:02.115186 kubelet[2003]: E1029 05:39:02.115097 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wm5qr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:02.117783 kubelet[2003]: E1029 05:39:02.116285 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:02.137000 audit[3984]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.137000 audit[3984]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd23ed3da0 a2=0 a3=7ffd23ed3d8c items=0 ppid=2112 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:02.143000 audit[3984]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.143000 audit[3984]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd23ed3da0 a2=0 a3=0 items=0 ppid=2112 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:02.146000 audit[3905]: AVC avc: denied { write } for pid=3905 comm="tee" name="fd" dev="proc" ino=31900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.146000 audit[3905]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa7bfd7c5 a2=241 a3=1b6 items=1 ppid=3728 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.146000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 29 05:39:02.146000 audit: PATH item=0 name="/dev/fd/63" inode=31315 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.204000 audit[3910]: AVC avc: denied { write } for pid=3910 comm="tee" name="fd" dev="proc" ino=31904 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.204000 audit[3910]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcff1747c5 a2=241 a3=1b6 items=1 ppid=3729 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.204000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 29 05:39:02.204000 audit: PATH item=0 name="/dev/fd/63" inode=31340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.221000 audit: BPF prog-id=177 op=LOAD Oct 29 05:39:02.222000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.222000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3859 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666131623032333164663030666562323339373036333438386136 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3859 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666131623032333164663030666562323339373036333438386136 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit: BPF prog-id=178 op=LOAD Oct 29 05:39:02.223000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d6000 items=0 ppid=3859 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666131623032333164663030666562323339373036333438386136 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit: BPF prog-id=179 op=LOAD Oct 29 05:39:02.223000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d6048 items=0 ppid=3859 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666131623032333164663030666562323339373036333438386136 Oct 29 05:39:02.223000 audit: BPF prog-id=179 op=UNLOAD Oct 29 05:39:02.223000 audit: BPF prog-id=178 op=UNLOAD Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:02.223000 audit: BPF prog-id=180 op=LOAD Oct 29 05:39:02.223000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d6458 items=0 ppid=3859 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666131623032333164663030666562323339373036333438386136 Oct 29 05:39:02.294098 systemd-networkd[1026]: cali99421d4bd95: Gained IPv6LL Oct 29 05:39:02.294652 systemd-networkd[1026]: califbfb9f4ff2b: Gained IPv6LL Oct 29 05:39:02.322388 systemd[1]: run-containerd-runc-k8s.io-9a5f8a64dd94492a755c550b53f3a71014495ae36b7a4ddc397e517abe0fdaa1-runc.xfJMvF.mount: Deactivated successfully. Oct 29 05:39:02.344000 audit[3969]: AVC avc: denied { write } for pid=3969 comm="tee" name="fd" dev="proc" ino=31508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.344000 audit[3969]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef73e27c6 a2=241 a3=1b6 items=1 ppid=3727 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.344000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 29 05:39:02.344000 audit: PATH item=0 name="/dev/fd/63" inode=31423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.352000 audit[3986]: AVC avc: denied { write } for pid=3986 comm="tee" name="fd" dev="proc" ino=31523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.352000 audit[3986]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcd1d37c5 a2=241 a3=1b6 items=1 ppid=3723 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.352000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 29 05:39:02.352000 audit: PATH item=0 name="/dev/fd/63" inode=31456 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.374690 kernel: kauditd_printk_skb: 594 callbacks suppressed Oct 29 05:39:02.383580 kernel: audit: type=1400 audit(1761716342.367:1227): avc: denied { write } for pid=3941 comm="tee" name="fd" dev="proc" ino=31528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.384172 kernel: audit: type=1300 audit(1761716342.367:1227): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe60aa57c7 a2=241 a3=1b6 items=1 ppid=3725 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.367000 audit[3941]: AVC avc: denied { write } for pid=3941 comm="tee" name="fd" dev="proc" ino=31528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 05:39:02.367000 audit[3941]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe60aa57c7 a2=241 a3=1b6 items=1 ppid=3725 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.367000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 29 05:39:02.367000 audit: PATH item=0 name="/dev/fd/63" inode=31368 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.397075 kernel: audit: type=1307 audit(1761716342.367:1227): cwd="/etc/service/enabled/cni/log" Oct 29 05:39:02.397309 kernel: audit: type=1302 audit(1761716342.367:1227): item=0 name="/dev/fd/63" inode=31368 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 05:39:02.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.400217 systemd-networkd[1026]: cali9a3d2e4143c: Gained IPv6LL Oct 29 05:39:02.402946 kernel: audit: type=1327 audit(1761716342.367:1227): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 05:39:02.447506 env[1199]: time="2025-10-29T05:39:02.447419787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-86f7c596bf-pqnfl,Uid:285f16da-2820-4d93-85eb-6ee81d208cf9,Namespace:calico-system,Attempt:0,} returns sandbox id \"bcfa1b0231df00feb2397063488a6fa53ceb8a5e4a8c7863e06bce0f9e56494e\"" Oct 29 05:39:02.463358 env[1199]: time="2025-10-29T05:39:02.463097704Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:02.464460 env[1199]: time="2025-10-29T05:39:02.464304894Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:02.464811 kubelet[2003]: E1029 05:39:02.464748 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:02.464978 kubelet[2003]: E1029 05:39:02.464825 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:02.465590 kubelet[2003]: E1029 05:39:02.465192 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sq27z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:02.465809 env[1199]: time="2025-10-29T05:39:02.465321000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 05:39:02.467533 kubelet[2003]: E1029 05:39:02.467211 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:02.657718 systemd-networkd[1026]: cali8f0cc806954: Gained IPv6LL Oct 29 05:39:02.720734 systemd-networkd[1026]: calib432d055b16: Gained IPv6LL Oct 29 05:39:02.766268 env[1199]: time="2025-10-29T05:39:02.766199207Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:02.768570 env[1199]: time="2025-10-29T05:39:02.768499786Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 05:39:02.769056 kubelet[2003]: E1029 05:39:02.768993 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:02.769190 kubelet[2003]: E1029 05:39:02.769076 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:02.769734 env[1199]: time="2025-10-29T05:39:02.769674270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 05:39:02.771853 kubelet[2003]: E1029 05:39:02.771785 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:02.803949 kubelet[2003]: E1029 05:39:02.803881 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:02.814171 kubelet[2003]: E1029 05:39:02.814024 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:02.814863 kubelet[2003]: E1029 05:39:02.814813 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:02.840810 kubelet[2003]: I1029 05:39:02.840712 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-t6vrc" podStartSLOduration=51.838196907 podStartE2EDuration="51.838196907s" podCreationTimestamp="2025-10-29 05:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:39:01.837200996 +0000 UTC m=+53.735854537" watchObservedRunningTime="2025-10-29 05:39:02.838196907 +0000 UTC m=+54.736850442" Oct 29 05:39:02.878093 kubelet[2003]: I1029 05:39:02.878007 2003 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-8qcp7" podStartSLOduration=51.877979686 podStartE2EDuration="51.877979686s" podCreationTimestamp="2025-10-29 05:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 05:39:02.858763194 +0000 UTC m=+54.757416733" watchObservedRunningTime="2025-10-29 05:39:02.877979686 +0000 UTC m=+54.776633222" Oct 29 05:39:02.896000 audit[4032]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.906255 kernel: audit: type=1325 audit(1761716342.896:1228): table=filter:107 family=2 entries=20 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.906475 kernel: audit: type=1300 audit(1761716342.896:1228): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc7912d7e0 a2=0 a3=7ffc7912d7cc items=0 ppid=2112 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.896000 audit[4032]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc7912d7e0 a2=0 a3=7ffc7912d7cc items=0 ppid=2112 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.896000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:02.923962 kernel: audit: type=1327 audit(1761716342.896:1228): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:02.933000 audit[4032]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.940942 kernel: audit: type=1325 audit(1761716342.933:1229): table=nat:108 family=2 entries=14 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:02.933000 audit[4032]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc7912d7e0 a2=0 a3=0 items=0 ppid=2112 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.951951 kernel: audit: type=1300 audit(1761716342.933:1229): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc7912d7e0 a2=0 a3=0 items=0 ppid=2112 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:02.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:03.031000 audit[4037]: NETFILTER_CFG table=filter:109 family=2 entries=17 op=nft_register_rule pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:03.031000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe7deb0010 a2=0 a3=7ffe7deafffc items=0 ppid=2112 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:03.041000 audit[4037]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:03.041000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe7deb0010 a2=0 a3=7ffe7deafffc items=0 ppid=2112 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:03.079143 env[1199]: time="2025-10-29T05:39:03.079037937Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:03.080599 env[1199]: time="2025-10-29T05:39:03.080535616Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 05:39:03.081237 kubelet[2003]: E1029 05:39:03.081175 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:03.081388 kubelet[2003]: E1029 05:39:03.081269 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:03.081788 kubelet[2003]: E1029 05:39:03.081712 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:0223bd01080849479eb5b60307f8d685,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:03.082395 env[1199]: time="2025-10-29T05:39:03.082357599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.093000 audit: BPF prog-id=181 op=LOAD Oct 29 05:39:03.093000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc94f8f9f0 a2=98 a3=1fffffffffffffff items=0 ppid=3738 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.093000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 05:39:03.094000 audit: BPF prog-id=181 op=UNLOAD Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.094000 audit: BPF prog-id=182 op=LOAD Oct 29 05:39:03.094000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc94f8f8d0 a2=94 a3=3 items=0 ppid=3738 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.094000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 05:39:03.095000 audit: BPF prog-id=182 op=UNLOAD Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit: BPF prog-id=183 op=LOAD Oct 29 05:39:03.095000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc94f8f910 a2=94 a3=7ffc94f8faf0 items=0 ppid=3738 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.095000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 05:39:03.095000 audit: BPF prog-id=183 op=UNLOAD Oct 29 05:39:03.095000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.095000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc94f8f9e0 a2=50 a3=a000000085 items=0 ppid=3738 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.095000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.102000 audit: BPF prog-id=184 op=LOAD Oct 29 05:39:03.102000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6d4bcfc0 a2=98 a3=3 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.103000 audit: BPF prog-id=184 op=UNLOAD Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit: BPF prog-id=185 op=LOAD Oct 29 05:39:03.104000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d4bcdb0 a2=94 a3=54428f items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.104000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.104000 audit: BPF prog-id=185 op=UNLOAD Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.104000 audit: BPF prog-id=186 op=LOAD Oct 29 05:39:03.104000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d4bcde0 a2=94 a3=2 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.104000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.104000 audit: BPF prog-id=186 op=UNLOAD Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.274000 audit: BPF prog-id=187 op=LOAD Oct 29 05:39:03.274000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6d4bcca0 a2=94 a3=1 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.274000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.275000 audit: BPF prog-id=187 op=UNLOAD Oct 29 05:39:03.275000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.275000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6d4bcd70 a2=50 a3=7ffd6d4bce50 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.288000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.288000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bccb0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.288000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6d4bcce0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6d4bcbf0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bcd00 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bcce0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bccd0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bcd00 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6d4bcce0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6d4bcd00 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.289000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.289000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6d4bccd0 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.291000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.291000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6d4bcd40 a2=28 a3=0 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.291000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6d4bcaf0 a2=50 a3=1 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.292000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit: BPF prog-id=188 op=LOAD Oct 29 05:39:03.292000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6d4bcaf0 a2=94 a3=5 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.292000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.292000 audit: BPF prog-id=188 op=UNLOAD Oct 29 05:39:03.292000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.292000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6d4bcba0 a2=50 a3=1 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.292000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.293000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.293000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6d4bccc0 a2=4 a3=38 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.293000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.294000 audit[4048]: AVC avc: denied { confidentiality } for pid=4048 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.294000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6d4bcd10 a2=94 a3=6 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.294000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { confidentiality } for pid=4048 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.295000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6d4bc4c0 a2=94 a3=88 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { perfmon } for pid=4048 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { bpf } for pid=4048 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.295000 audit[4048]: AVC avc: denied { confidentiality } for pid=4048 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.295000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6d4bc4c0 a2=94 a3=88 items=0 ppid=3738 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.326000 audit: BPF prog-id=189 op=LOAD Oct 29 05:39:03.326000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc432cd4c0 a2=98 a3=1999999999999999 items=0 ppid=3738 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.326000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 05:39:03.327000 audit: BPF prog-id=189 op=UNLOAD Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit: BPF prog-id=190 op=LOAD Oct 29 05:39:03.327000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc432cd3a0 a2=94 a3=ffff items=0 ppid=3738 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.327000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 05:39:03.327000 audit: BPF prog-id=190 op=UNLOAD Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.327000 audit: BPF prog-id=191 op=LOAD Oct 29 05:39:03.327000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc432cd3e0 a2=94 a3=7ffc432cd5c0 items=0 ppid=3738 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.327000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 05:39:03.327000 audit: BPF prog-id=191 op=UNLOAD Oct 29 05:39:03.379820 systemd-networkd[1026]: cali2dd3a6f2960: Gained IPv6LL Oct 29 05:39:03.387000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.387000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00f1c43a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.387000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.388000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.388000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0110966c0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.388000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525840 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.388000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011096720 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.406305 env[1199]: time="2025-10-29T05:39:03.406233310Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:03.407587 env[1199]: time="2025-10-29T05:39:03.407501536Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 05:39:03.408152 kubelet[2003]: E1029 05:39:03.408070 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:03.408277 kubelet[2003]: E1029 05:39:03.408168 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:03.408544 kubelet[2003]: E1029 05:39:03.408458 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:03.409491 env[1199]: time="2025-10-29T05:39:03.409432291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 05:39:03.410589 kubelet[2003]: E1029 05:39:03.410467 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:39:03.410000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.412000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.412000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010563aa0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.412000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.410000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ecf93e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.424000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525846 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:03.424000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010563d10 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:39:03.424000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:39:03.482195 systemd-networkd[1026]: vxlan.calico: Link UP Oct 29 05:39:03.482206 systemd-networkd[1026]: vxlan.calico: Gained carrier Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.544000 audit: BPF prog-id=192 op=LOAD Oct 29 05:39:03.544000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbc8d5180 a2=98 a3=20 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.544000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.545000 audit: BPF prog-id=192 op=UNLOAD Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.547000 audit: BPF prog-id=193 op=LOAD Oct 29 05:39:03.547000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbc8d4f90 a2=94 a3=54428f items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.547000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.550000 audit: BPF prog-id=193 op=UNLOAD Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.550000 audit: BPF prog-id=194 op=LOAD Oct 29 05:39:03.550000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbc8d4fc0 a2=94 a3=2 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.550000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.552000 audit: BPF prog-id=194 op=UNLOAD Oct 29 05:39:03.552000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.552000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4e90 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.552000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbc8d4ec0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbc8d4dd0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4ee0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4ec0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4eb0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4ee0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbc8d4ec0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbc8d4ee0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbc8d4eb0 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbc8d4f20 a2=28 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.553000 audit: BPF prog-id=195 op=LOAD Oct 29 05:39:03.553000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbc8d4d90 a2=94 a3=0 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.556000 audit: BPF prog-id=195 op=UNLOAD Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffbc8d4d80 a2=50 a3=2800 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.565000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffbc8d4d80 a2=50 a3=2800 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.565000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit: BPF prog-id=196 op=LOAD Oct 29 05:39:03.565000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbc8d45a0 a2=94 a3=2 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.565000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.565000 audit: BPF prog-id=196 op=UNLOAD Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.565000 audit: BPF prog-id=197 op=LOAD Oct 29 05:39:03.565000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbc8d46a0 a2=94 a3=30 items=0 ppid=3738 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.565000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.575000 audit: BPF prog-id=198 op=LOAD Oct 29 05:39:03.575000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff01fb4b10 a2=98 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.575000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.577000 audit: BPF prog-id=198 op=UNLOAD Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit: BPF prog-id=199 op=LOAD Oct 29 05:39:03.578000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff01fb4900 a2=94 a3=54428f items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.578000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.578000 audit: BPF prog-id=199 op=UNLOAD Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.578000 audit: BPF prog-id=200 op=LOAD Oct 29 05:39:03.578000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff01fb4930 a2=94 a3=2 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.578000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.578000 audit: BPF prog-id=200 op=UNLOAD Oct 29 05:39:03.715811 env[1199]: time="2025-10-29T05:39:03.715736436Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:03.717403 env[1199]: time="2025-10-29T05:39:03.717332506Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 05:39:03.718454 kubelet[2003]: E1029 05:39:03.717932 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:03.718454 kubelet[2003]: E1029 05:39:03.718030 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:03.718454 kubelet[2003]: E1029 05:39:03.718344 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:03.719732 kubelet[2003]: E1029 05:39:03.719653 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit: BPF prog-id=201 op=LOAD Oct 29 05:39:03.798000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff01fb47f0 a2=94 a3=1 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.798000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.798000 audit: BPF prog-id=201 op=UNLOAD Oct 29 05:39:03.798000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.798000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff01fb48c0 a2=50 a3=7fff01fb49a0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.798000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.817822 kubelet[2003]: E1029 05:39:03.817734 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:39:03.818425 kubelet[2003]: E1029 05:39:03.817984 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:39:03.818425 kubelet[2003]: E1029 05:39:03.818079 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:03.819000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.819000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4800 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.819000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.819000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.819000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01fb4830 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.819000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.820000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.820000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01fb4740 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.820000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.820000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.820000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4850 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.820000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.820000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.820000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4830 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.820000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.821000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.821000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4820 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.821000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.821000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.821000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4850 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.821000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.822000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.822000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01fb4830 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.822000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.822000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.822000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01fb4850 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.822000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.822000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.822000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff01fb4820 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.822000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff01fb4890 a2=28 a3=0 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.823000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff01fb4640 a2=50 a3=1 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.823000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.823000 audit: BPF prog-id=202 op=LOAD Oct 29 05:39:03.823000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff01fb4640 a2=94 a3=5 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.823000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.824000 audit: BPF prog-id=202 op=UNLOAD Oct 29 05:39:03.825000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.825000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff01fb46f0 a2=50 a3=1 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.825000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.825000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff01fb4810 a2=4 a3=38 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.826000 audit[4080]: AVC avc: denied { confidentiality } for pid=4080 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.826000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01fb4860 a2=94 a3=6 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.827000 audit[4080]: AVC avc: denied { confidentiality } for pid=4080 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.827000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01fb4010 a2=94 a3=88 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.828000 audit[4080]: AVC avc: denied { confidentiality } for pid=4080 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 05:39:03.828000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff01fb4010 a2=94 a3=88 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.831000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.831000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01fb5a40 a2=10 a3=f8f00800 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.831000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.832000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.832000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01fb58e0 a2=10 a3=3 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.832000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.832000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01fb5880 a2=10 a3=3 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.832000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:03.832000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff01fb5880 a2=10 a3=7 items=0 ppid=3738 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:03.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 05:39:03.848000 audit: BPF prog-id=197 op=UNLOAD Oct 29 05:39:04.044000 audit[4124]: NETFILTER_CFG table=mangle:111 family=2 entries=16 op=nft_register_chain pid=4124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:04.044000 audit[4124]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffb00c3b90 a2=0 a3=7fffb00c3b7c items=0 ppid=3738 pid=4124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.044000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:04.051000 audit[4123]: NETFILTER_CFG table=nat:112 family=2 entries=15 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:04.051000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff85160ed0 a2=0 a3=7fff85160ebc items=0 ppid=3738 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.051000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:04.060000 audit[4121]: NETFILTER_CFG table=raw:113 family=2 entries=21 op=nft_register_chain pid=4121 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:04.060000 audit[4121]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdaf2d8f70 a2=0 a3=7ffdaf2d8f5c items=0 ppid=3738 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.060000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:04.070000 audit[4135]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:04.070000 audit[4135]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffce9a46fe0 a2=0 a3=7ffce9a46fcc items=0 ppid=2112 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:04.086000 audit[4135]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:39:04.086000 audit[4135]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffce9a46fe0 a2=0 a3=7ffce9a46fcc items=0 ppid=2112 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:39:04.089000 audit[4128]: NETFILTER_CFG table=filter:116 family=2 entries=293 op=nft_register_chain pid=4128 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:04.089000 audit[4128]: SYSCALL arch=c000003e syscall=46 success=yes exit=173940 a0=3 a1=7ffc0076fdd0 a2=0 a3=55d79124f000 items=0 ppid=3738 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:04.089000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:04.835770 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Oct 29 05:39:06.518000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:06.518000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000043e80 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:06.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:06.519000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:06.519000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000043ec0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:06.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:06.520000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:06.520000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000043f00 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:06.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:06.520000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:39:06.520000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000043f40 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:39:06.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:39:08.389174 env[1199]: time="2025-10-29T05:39:08.388949152Z" level=info msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.507 [WARNING][4154] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"1215c1dc-2e72-4d1b-9366-b75eae9af1f6", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5", Pod:"calico-apiserver-779769bb48-tjm6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a3d2e4143c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.509 [INFO][4154] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.509 [INFO][4154] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" iface="eth0" netns="" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.509 [INFO][4154] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.509 [INFO][4154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.561 [INFO][4163] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.561 [INFO][4163] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.561 [INFO][4163] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.574 [WARNING][4163] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.574 [INFO][4163] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.576 [INFO][4163] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:08.583586 env[1199]: 2025-10-29 05:39:08.580 [INFO][4154] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.586142 env[1199]: time="2025-10-29T05:39:08.583620694Z" level=info msg="TearDown network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" successfully" Oct 29 05:39:08.586142 env[1199]: time="2025-10-29T05:39:08.583657689Z" level=info msg="StopPodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" returns successfully" Oct 29 05:39:08.588589 env[1199]: time="2025-10-29T05:39:08.588549781Z" level=info msg="RemovePodSandbox for \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" Oct 29 05:39:08.588858 env[1199]: time="2025-10-29T05:39:08.588760479Z" level=info msg="Forcibly stopping sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\"" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.644 [WARNING][4178] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"1215c1dc-2e72-4d1b-9366-b75eae9af1f6", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"888dfb7ac50f199aa1d709cebb4d668262c392a67bd98968c5cd3e9dbb617af5", Pod:"calico-apiserver-779769bb48-tjm6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a3d2e4143c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.645 [INFO][4178] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.645 [INFO][4178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" iface="eth0" netns="" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.645 [INFO][4178] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.645 [INFO][4178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.680 [INFO][4186] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.680 [INFO][4186] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.680 [INFO][4186] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.694 [WARNING][4186] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.694 [INFO][4186] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" HandleID="k8s-pod-network.f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--tjm6f-eth0" Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.696 [INFO][4186] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:08.702617 env[1199]: 2025-10-29 05:39:08.699 [INFO][4178] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4" Oct 29 05:39:08.702617 env[1199]: time="2025-10-29T05:39:08.701467597Z" level=info msg="TearDown network for sandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" successfully" Oct 29 05:39:08.706413 env[1199]: time="2025-10-29T05:39:08.706358914Z" level=info msg="RemovePodSandbox \"f5a80cf90210224eff4d1f378ef9d153304c31cf50264886302e22ada6c811e4\" returns successfully" Oct 29 05:39:08.707560 env[1199]: time="2025-10-29T05:39:08.707495595Z" level=info msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.762 [WARNING][4201] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e6ea8502-2cb9-417e-83f2-d0631b0ba769", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829", Pod:"calico-apiserver-779769bb48-8n95q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib432d055b16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.762 [INFO][4201] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.763 [INFO][4201] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" iface="eth0" netns="" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.763 [INFO][4201] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.763 [INFO][4201] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.792 [INFO][4208] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.793 [INFO][4208] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.793 [INFO][4208] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.802 [WARNING][4208] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.802 [INFO][4208] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.804 [INFO][4208] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:08.808794 env[1199]: 2025-10-29 05:39:08.806 [INFO][4201] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.809849 env[1199]: time="2025-10-29T05:39:08.809797029Z" level=info msg="TearDown network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" successfully" Oct 29 05:39:08.810557 env[1199]: time="2025-10-29T05:39:08.810010445Z" level=info msg="StopPodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" returns successfully" Oct 29 05:39:08.810926 env[1199]: time="2025-10-29T05:39:08.810836953Z" level=info msg="RemovePodSandbox for \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" Oct 29 05:39:08.811015 env[1199]: time="2025-10-29T05:39:08.810912604Z" level=info msg="Forcibly stopping sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\"" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.873 [WARNING][4223] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0", GenerateName:"calico-apiserver-779769bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"e6ea8502-2cb9-417e-83f2-d0631b0ba769", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"779769bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"227cc892baf125ccb66933d827e84d2a5e4ade2b958326702aa71ca298d19829", Pod:"calico-apiserver-779769bb48-8n95q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.119.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib432d055b16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.874 [INFO][4223] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.874 [INFO][4223] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" iface="eth0" netns="" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.874 [INFO][4223] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.874 [INFO][4223] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.903 [INFO][4230] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.903 [INFO][4230] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.903 [INFO][4230] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.912 [WARNING][4230] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.912 [INFO][4230] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" HandleID="k8s-pod-network.1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--apiserver--779769bb48--8n95q-eth0" Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.922 [INFO][4230] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:08.931833 env[1199]: 2025-10-29 05:39:08.926 [INFO][4223] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca" Oct 29 05:39:08.934033 env[1199]: time="2025-10-29T05:39:08.933978906Z" level=info msg="TearDown network for sandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" successfully" Oct 29 05:39:08.939328 env[1199]: time="2025-10-29T05:39:08.939078214Z" level=info msg="RemovePodSandbox \"1bdf4ec6519dc47bbaaf7aaa55dca94513b31d7d7e8b5125df4fb2a9b69354ca\" returns successfully" Oct 29 05:39:08.940928 env[1199]: time="2025-10-29T05:39:08.940870767Z" level=info msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.020 [WARNING][4246] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121", Pod:"coredns-674b8bbfcf-8qcp7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califbfb9f4ff2b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.020 [INFO][4246] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.020 [INFO][4246] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" iface="eth0" netns="" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.020 [INFO][4246] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.020 [INFO][4246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.065 [INFO][4254] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.065 [INFO][4254] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.066 [INFO][4254] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.076 [WARNING][4254] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.076 [INFO][4254] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.078 [INFO][4254] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.085378 env[1199]: 2025-10-29 05:39:09.080 [INFO][4246] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.085378 env[1199]: time="2025-10-29T05:39:09.083015967Z" level=info msg="TearDown network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" successfully" Oct 29 05:39:09.085378 env[1199]: time="2025-10-29T05:39:09.083074787Z" level=info msg="StopPodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" returns successfully" Oct 29 05:39:09.085378 env[1199]: time="2025-10-29T05:39:09.083874367Z" level=info msg="RemovePodSandbox for \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" Oct 29 05:39:09.085378 env[1199]: time="2025-10-29T05:39:09.083968423Z" level=info msg="Forcibly stopping sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\"" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.142 [WARNING][4275] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"b5e3bce5-6700-4e82-84e0-b76d2b64eb1f", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"05308963cfec81ac41113ab3fe6c252a597fa131384a86bc65c0af99456d5121", Pod:"coredns-674b8bbfcf-8qcp7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califbfb9f4ff2b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.143 [INFO][4275] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.143 [INFO][4275] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" iface="eth0" netns="" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.143 [INFO][4275] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.143 [INFO][4275] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.174 [INFO][4284] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.175 [INFO][4284] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.175 [INFO][4284] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.185 [WARNING][4284] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.185 [INFO][4284] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" HandleID="k8s-pod-network.a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--8qcp7-eth0" Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.188 [INFO][4284] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.192005 env[1199]: 2025-10-29 05:39:09.190 [INFO][4275] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069" Oct 29 05:39:09.193062 env[1199]: time="2025-10-29T05:39:09.192027586Z" level=info msg="TearDown network for sandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" successfully" Oct 29 05:39:09.197678 env[1199]: time="2025-10-29T05:39:09.197623479Z" level=info msg="RemovePodSandbox \"a8bc3fd6112e774a0b88f8e21d537ac9324c5155b423b3177b0909f28ad30069\" returns successfully" Oct 29 05:39:09.198523 env[1199]: time="2025-10-29T05:39:09.198463735Z" level=info msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.260 [WARNING][4298] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43", Pod:"goldmane-666569f655-nskqc", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.119.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8f0cc806954", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.261 [INFO][4298] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.261 [INFO][4298] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" iface="eth0" netns="" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.261 [INFO][4298] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.261 [INFO][4298] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.293 [INFO][4306] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.294 [INFO][4306] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.294 [INFO][4306] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.304 [WARNING][4306] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.304 [INFO][4306] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.307 [INFO][4306] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.311015 env[1199]: 2025-10-29 05:39:09.308 [INFO][4298] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.312089 env[1199]: time="2025-10-29T05:39:09.311024792Z" level=info msg="TearDown network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" successfully" Oct 29 05:39:09.312089 env[1199]: time="2025-10-29T05:39:09.311073195Z" level=info msg="StopPodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" returns successfully" Oct 29 05:39:09.312089 env[1199]: time="2025-10-29T05:39:09.311722666Z" level=info msg="RemovePodSandbox for \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" Oct 29 05:39:09.312089 env[1199]: time="2025-10-29T05:39:09.311775763Z" level=info msg="Forcibly stopping sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\"" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.377 [WARNING][4321] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c6a0ae0a-392f-42e9-8917-4eeb8b86e85c", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"1c9308f551b48fc97a5b1873e2c7577185cfa8976fb97680dfa765c2d4267c43", Pod:"goldmane-666569f655-nskqc", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.119.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali8f0cc806954", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.378 [INFO][4321] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.378 [INFO][4321] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" iface="eth0" netns="" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.378 [INFO][4321] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.378 [INFO][4321] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.424 [INFO][4328] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.431 [INFO][4328] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.431 [INFO][4328] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.440 [WARNING][4328] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.440 [INFO][4328] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" HandleID="k8s-pod-network.4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Workload="srv--gd80c.gb1.brightbox.com-k8s-goldmane--666569f655--nskqc-eth0" Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.442 [INFO][4328] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.447080 env[1199]: 2025-10-29 05:39:09.445 [INFO][4321] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d" Oct 29 05:39:09.448630 env[1199]: time="2025-10-29T05:39:09.448012680Z" level=info msg="TearDown network for sandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" successfully" Oct 29 05:39:09.456406 env[1199]: time="2025-10-29T05:39:09.456357340Z" level=info msg="RemovePodSandbox \"4921c220bf8e1b40b8eda51b815995f300d3f7b3979e1bf1062129b1280a326d\" returns successfully" Oct 29 05:39:09.457726 env[1199]: time="2025-10-29T05:39:09.457152327Z" level=info msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.511 [WARNING][4342] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"43f5bd14-1490-4579-b736-7553352437ec", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c", Pod:"coredns-674b8bbfcf-t6vrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia8b703503c0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.511 [INFO][4342] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.511 [INFO][4342] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" iface="eth0" netns="" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.511 [INFO][4342] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.511 [INFO][4342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.544 [INFO][4350] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.544 [INFO][4350] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.544 [INFO][4350] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.554 [WARNING][4350] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.554 [INFO][4350] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.557 [INFO][4350] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.561888 env[1199]: 2025-10-29 05:39:09.559 [INFO][4342] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.563455 env[1199]: time="2025-10-29T05:39:09.562532713Z" level=info msg="TearDown network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" successfully" Oct 29 05:39:09.563455 env[1199]: time="2025-10-29T05:39:09.562591709Z" level=info msg="StopPodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" returns successfully" Oct 29 05:39:09.563455 env[1199]: time="2025-10-29T05:39:09.563424381Z" level=info msg="RemovePodSandbox for \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" Oct 29 05:39:09.563638 env[1199]: time="2025-10-29T05:39:09.563463923Z" level=info msg="Forcibly stopping sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\"" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.611 [WARNING][4364] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"43f5bd14-1490-4579-b736-7553352437ec", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"3682656deea16134632ba82ecaa0a5f481877342497b45af946b3ed4a5ca512c", Pod:"coredns-674b8bbfcf-t6vrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.119.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia8b703503c0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.611 [INFO][4364] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.611 [INFO][4364] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" iface="eth0" netns="" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.611 [INFO][4364] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.611 [INFO][4364] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.648 [INFO][4372] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.648 [INFO][4372] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.648 [INFO][4372] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.657 [WARNING][4372] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.657 [INFO][4372] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" HandleID="k8s-pod-network.1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Workload="srv--gd80c.gb1.brightbox.com-k8s-coredns--674b8bbfcf--t6vrc-eth0" Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.660 [INFO][4372] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.666551 env[1199]: 2025-10-29 05:39:09.662 [INFO][4364] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d" Oct 29 05:39:09.668443 env[1199]: time="2025-10-29T05:39:09.668383475Z" level=info msg="TearDown network for sandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" successfully" Oct 29 05:39:09.673938 env[1199]: time="2025-10-29T05:39:09.673853523Z" level=info msg="RemovePodSandbox \"1eb20c5a0f3a41e7dcb4819f886f9f46cd3f12fbc8dd5e042bbad2e45f27335d\" returns successfully" Oct 29 05:39:09.675053 env[1199]: time="2025-10-29T05:39:09.674998660Z" level=info msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.740 [WARNING][4387] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5092f51d-06fc-4dab-b0c4-32dc46cf7538", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a", Pod:"csi-node-driver-5lk8x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99421d4bd95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.740 [INFO][4387] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.740 [INFO][4387] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" iface="eth0" netns="" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.740 [INFO][4387] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.740 [INFO][4387] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.784 [INFO][4395] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.784 [INFO][4395] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.784 [INFO][4395] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.794 [WARNING][4395] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.794 [INFO][4395] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.797 [INFO][4395] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.801646 env[1199]: 2025-10-29 05:39:09.799 [INFO][4387] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.804450 env[1199]: time="2025-10-29T05:39:09.802874539Z" level=info msg="TearDown network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" successfully" Oct 29 05:39:09.804658 env[1199]: time="2025-10-29T05:39:09.804622105Z" level=info msg="StopPodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" returns successfully" Oct 29 05:39:09.805957 env[1199]: time="2025-10-29T05:39:09.805893077Z" level=info msg="RemovePodSandbox for \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" Oct 29 05:39:09.806055 env[1199]: time="2025-10-29T05:39:09.805967357Z" level=info msg="Forcibly stopping sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\"" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.872 [WARNING][4410] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5092f51d-06fc-4dab-b0c4-32dc46cf7538", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"e674db36f90e679ad9bacb601e8ac4efc1e0734242c34760e7df0a4373db574a", Pod:"csi-node-driver-5lk8x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali99421d4bd95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.872 [INFO][4410] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.872 [INFO][4410] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" iface="eth0" netns="" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.872 [INFO][4410] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.872 [INFO][4410] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.902 [INFO][4417] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.903 [INFO][4417] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.903 [INFO][4417] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.912 [WARNING][4417] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.912 [INFO][4417] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" HandleID="k8s-pod-network.1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Workload="srv--gd80c.gb1.brightbox.com-k8s-csi--node--driver--5lk8x-eth0" Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.916 [INFO][4417] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:09.924579 env[1199]: 2025-10-29 05:39:09.921 [INFO][4410] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d" Oct 29 05:39:09.925726 env[1199]: time="2025-10-29T05:39:09.924621181Z" level=info msg="TearDown network for sandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" successfully" Oct 29 05:39:09.928510 env[1199]: time="2025-10-29T05:39:09.928466612Z" level=info msg="RemovePodSandbox \"1342ed0752886be25e6bd520859836389773c116a7e273af4a55d944525dac7d\" returns successfully" Oct 29 05:39:09.929337 env[1199]: time="2025-10-29T05:39:09.929298173Z" level=info msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:09.978 [WARNING][4431] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:09.978 [INFO][4431] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:09.978 [INFO][4431] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" iface="eth0" netns="" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:09.978 [INFO][4431] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:09.978 [INFO][4431] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.021 [INFO][4438] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.021 [INFO][4438] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.021 [INFO][4438] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.035 [WARNING][4438] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.035 [INFO][4438] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.037 [INFO][4438] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:10.042876 env[1199]: 2025-10-29 05:39:10.040 [INFO][4431] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.042876 env[1199]: time="2025-10-29T05:39:10.042614567Z" level=info msg="TearDown network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" successfully" Oct 29 05:39:10.042876 env[1199]: time="2025-10-29T05:39:10.042663442Z" level=info msg="StopPodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" returns successfully" Oct 29 05:39:10.044736 env[1199]: time="2025-10-29T05:39:10.044268407Z" level=info msg="RemovePodSandbox for \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" Oct 29 05:39:10.044736 env[1199]: time="2025-10-29T05:39:10.044320239Z" level=info msg="Forcibly stopping sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\"" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.134 [WARNING][4453] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.135 [INFO][4453] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.135 [INFO][4453] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" iface="eth0" netns="" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.135 [INFO][4453] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.135 [INFO][4453] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.169 [INFO][4460] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.169 [INFO][4460] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.169 [INFO][4460] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.180 [WARNING][4460] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.181 [INFO][4460] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" HandleID="k8s-pod-network.f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Workload="srv--gd80c.gb1.brightbox.com-k8s-whisker--bf949d9f7--8mjrq-eth0" Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.183 [INFO][4460] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:10.188447 env[1199]: 2025-10-29 05:39:10.186 [INFO][4453] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6" Oct 29 05:39:10.189511 env[1199]: time="2025-10-29T05:39:10.188474131Z" level=info msg="TearDown network for sandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" successfully" Oct 29 05:39:10.193330 env[1199]: time="2025-10-29T05:39:10.193287072Z" level=info msg="RemovePodSandbox \"f8ce0d5a20196f785b6f34336bfe5e92305fffd18a0beb360a7213229e2bb7e6\" returns successfully" Oct 29 05:39:10.422698 env[1199]: time="2025-10-29T05:39:10.422609885Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.497 [INFO][4477] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.498 [INFO][4477] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" iface="eth0" netns="/var/run/netns/cni-f7ee17a2-a729-9fa2-ad49-154ae6a1038f" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.499 [INFO][4477] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" iface="eth0" netns="/var/run/netns/cni-f7ee17a2-a729-9fa2-ad49-154ae6a1038f" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.501 [INFO][4477] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" iface="eth0" netns="/var/run/netns/cni-f7ee17a2-a729-9fa2-ad49-154ae6a1038f" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.501 [INFO][4477] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.501 [INFO][4477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.534 [INFO][4485] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.535 [INFO][4485] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.535 [INFO][4485] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.545 [WARNING][4485] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.545 [INFO][4485] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.547 [INFO][4485] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:10.552269 env[1199]: 2025-10-29 05:39:10.549 [INFO][4477] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:39:10.554063 env[1199]: time="2025-10-29T05:39:10.553998778Z" level=info msg="TearDown network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" successfully" Oct 29 05:39:10.554239 env[1199]: time="2025-10-29T05:39:10.554196674Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" returns successfully" Oct 29 05:39:10.561765 systemd[1]: run-netns-cni\x2df7ee17a2\x2da729\x2d9fa2\x2dad49\x2d154ae6a1038f.mount: Deactivated successfully. Oct 29 05:39:10.563860 env[1199]: time="2025-10-29T05:39:10.563817189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8cf699dc5-hszxg,Uid:8893c55d-6f83-44df-994b-b713e5abd120,Namespace:calico-system,Attempt:1,}" Oct 29 05:39:10.742610 systemd-networkd[1026]: calic6b3ea496ca: Link UP Oct 29 05:39:10.748670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 05:39:10.748815 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic6b3ea496ca: link becomes ready Oct 29 05:39:10.749107 systemd-networkd[1026]: calic6b3ea496ca: Gained carrier Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.630 [INFO][4491] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0 calico-kube-controllers-8cf699dc5- calico-system 8893c55d-6f83-44df-994b-b713e5abd120 1063 0 2025-10-29 05:38:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8cf699dc5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-gd80c.gb1.brightbox.com calico-kube-controllers-8cf699dc5-hszxg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic6b3ea496ca [] [] }} ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.630 [INFO][4491] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.668 [INFO][4504] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" HandleID="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.668 [INFO][4504] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" HandleID="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-gd80c.gb1.brightbox.com", "pod":"calico-kube-controllers-8cf699dc5-hszxg", "timestamp":"2025-10-29 05:39:10.668396361 +0000 UTC"}, Hostname:"srv-gd80c.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.668 [INFO][4504] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.668 [INFO][4504] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.668 [INFO][4504] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-gd80c.gb1.brightbox.com' Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.680 [INFO][4504] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.693 [INFO][4504] ipam/ipam.go 394: Looking up existing affinities for host host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.700 [INFO][4504] ipam/ipam.go 511: Trying affinity for 192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.703 [INFO][4504] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.707 [INFO][4504] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.128/26 host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.708 [INFO][4504] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.128/26 handle="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.710 [INFO][4504] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577 Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.723 [INFO][4504] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.128/26 handle="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.733 [INFO][4504] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.136/26] block=192.168.119.128/26 handle="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.733 [INFO][4504] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.136/26] handle="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" host="srv-gd80c.gb1.brightbox.com" Oct 29 05:39:10.774449 env[1199]: 2025-10-29 05:39:10.733 [INFO][4504] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:39:10.776196 env[1199]: 2025-10-29 05:39:10.733 [INFO][4504] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.136/26] IPv6=[] ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" HandleID="k8s-pod-network.00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.776196 env[1199]: 2025-10-29 05:39:10.735 [INFO][4491] cni-plugin/k8s.go 418: Populated endpoint ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0", GenerateName:"calico-kube-controllers-8cf699dc5-", Namespace:"calico-system", SelfLink:"", UID:"8893c55d-6f83-44df-994b-b713e5abd120", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8cf699dc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-8cf699dc5-hszxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.119.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic6b3ea496ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:10.776196 env[1199]: 2025-10-29 05:39:10.736 [INFO][4491] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.136/32] ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.776196 env[1199]: 2025-10-29 05:39:10.736 [INFO][4491] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic6b3ea496ca ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.776196 env[1199]: 2025-10-29 05:39:10.752 [INFO][4491] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.776599 env[1199]: 2025-10-29 05:39:10.753 [INFO][4491] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0", GenerateName:"calico-kube-controllers-8cf699dc5-", Namespace:"calico-system", SelfLink:"", UID:"8893c55d-6f83-44df-994b-b713e5abd120", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8cf699dc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577", Pod:"calico-kube-controllers-8cf699dc5-hszxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.119.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic6b3ea496ca", MAC:"d2:8b:a3:82:c8:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:39:10.776599 env[1199]: 2025-10-29 05:39:10.767 [INFO][4491] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577" Namespace="calico-system" Pod="calico-kube-controllers-8cf699dc5-hszxg" WorkloadEndpoint="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:39:10.802017 env[1199]: time="2025-10-29T05:39:10.801853174Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 05:39:10.802017 env[1199]: time="2025-10-29T05:39:10.801937021Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 05:39:10.802017 env[1199]: time="2025-10-29T05:39:10.801958282Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 05:39:10.802771 env[1199]: time="2025-10-29T05:39:10.802630959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577 pid=4528 runtime=io.containerd.runc.v2 Oct 29 05:39:10.817173 kernel: kauditd_printk_skb: 565 callbacks suppressed Oct 29 05:39:10.817366 kernel: audit: type=1325 audit(1761716350.807:1346): table=filter:117 family=2 entries=56 op=nft_register_chain pid=4534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:10.807000 audit[4534]: NETFILTER_CFG table=filter:117 family=2 entries=56 op=nft_register_chain pid=4534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 05:39:10.835529 kernel: audit: type=1300 audit(1761716350.807:1346): arch=c000003e syscall=46 success=yes exit=25500 a0=3 a1=7fff051708c0 a2=0 a3=7fff051708ac items=0 ppid=3738 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.807000 audit[4534]: SYSCALL arch=c000003e syscall=46 success=yes exit=25500 a0=3 a1=7fff051708c0 a2=0 a3=7fff051708ac items=0 ppid=3738 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.807000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:10.841930 kernel: audit: type=1327 audit(1761716350.807:1346): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 05:39:10.866222 systemd[1]: Started cri-containerd-00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577.scope. Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.935484 kernel: audit: type=1400 audit(1761716350.923:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.935590 kernel: audit: type=1400 audit(1761716350.923:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.940719 kernel: audit: type=1400 audit(1761716350.923:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.947245 kernel: audit: type=1400 audit(1761716350.923:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.952450 kernel: audit: type=1400 audit(1761716350.923:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.957875 kernel: audit: type=1400 audit(1761716350.923:1352): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.958006 kernel: audit: type=1400 audit(1761716350.923:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.923000 audit: BPF prog-id=203 op=LOAD Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4528 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646431653733306333386134323963326535353830393434363434 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4528 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646431653733306333386134323963326535353830393434363434 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.928000 audit: BPF prog-id=204 op=LOAD Oct 29 05:39:10.928000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000286580 items=0 ppid=4528 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646431653733306333386134323963326535353830393434363434 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit: BPF prog-id=205 op=LOAD Oct 29 05:39:10.929000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002865c8 items=0 ppid=4528 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646431653733306333386134323963326535353830393434363434 Oct 29 05:39:10.929000 audit: BPF prog-id=205 op=UNLOAD Oct 29 05:39:10.929000 audit: BPF prog-id=204 op=UNLOAD Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 05:39:10.929000 audit: BPF prog-id=206 op=LOAD Oct 29 05:39:10.929000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002869d8 items=0 ppid=4528 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:10.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646431653733306333386134323963326535353830393434363434 Oct 29 05:39:11.008477 env[1199]: time="2025-10-29T05:39:11.008409761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8cf699dc5-hszxg,Uid:8893c55d-6f83-44df-994b-b713e5abd120,Namespace:calico-system,Attempt:1,} returns sandbox id \"00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577\"" Oct 29 05:39:11.013644 env[1199]: time="2025-10-29T05:39:11.013563293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 05:39:11.329202 env[1199]: time="2025-10-29T05:39:11.329080759Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:11.330857 env[1199]: time="2025-10-29T05:39:11.330788870Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 05:39:11.331585 kubelet[2003]: E1029 05:39:11.331467 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:11.332327 kubelet[2003]: E1029 05:39:11.331608 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:11.332581 kubelet[2003]: E1029 05:39:11.332438 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2425b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:11.334353 kubelet[2003]: E1029 05:39:11.333688 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:11.556243 systemd[1]: run-containerd-runc-k8s.io-00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577-runc.Lb035C.mount: Deactivated successfully. Oct 29 05:39:11.861786 kubelet[2003]: E1029 05:39:11.861448 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:12.384652 systemd-networkd[1026]: calic6b3ea496ca: Gained IPv6LL Oct 29 05:39:12.863656 kubelet[2003]: E1029 05:39:12.863594 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:14.424748 env[1199]: time="2025-10-29T05:39:14.424058700Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 05:39:14.743465 env[1199]: time="2025-10-29T05:39:14.743252003Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:14.745253 env[1199]: time="2025-10-29T05:39:14.745184453Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 05:39:14.745795 kubelet[2003]: E1029 05:39:14.745729 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:14.746300 kubelet[2003]: E1029 05:39:14.745815 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:14.746300 kubelet[2003]: E1029 05:39:14.746044 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:0223bd01080849479eb5b60307f8d685,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:14.748791 env[1199]: time="2025-10-29T05:39:14.748752858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 05:39:15.054286 env[1199]: time="2025-10-29T05:39:15.054090757Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:15.055881 env[1199]: time="2025-10-29T05:39:15.055818915Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 05:39:15.056236 kubelet[2003]: E1029 05:39:15.056181 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:15.056346 kubelet[2003]: E1029 05:39:15.056255 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:15.056519 kubelet[2003]: E1029 05:39:15.056439 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:15.058146 kubelet[2003]: E1029 05:39:15.058084 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:39:15.424197 env[1199]: time="2025-10-29T05:39:15.424091372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:15.736679 env[1199]: time="2025-10-29T05:39:15.736054563Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:15.738058 env[1199]: time="2025-10-29T05:39:15.737971737Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:15.738639 kubelet[2003]: E1029 05:39:15.738537 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:15.738813 kubelet[2003]: E1029 05:39:15.738698 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:15.739688 kubelet[2003]: E1029 05:39:15.739200 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sq27z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:15.740564 kubelet[2003]: E1029 05:39:15.740506 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:17.425567 env[1199]: time="2025-10-29T05:39:17.425437083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:17.730346 env[1199]: time="2025-10-29T05:39:17.730065418Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:17.733480 env[1199]: time="2025-10-29T05:39:17.733304661Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:17.735491 kubelet[2003]: E1029 05:39:17.733967 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:17.738311 kubelet[2003]: E1029 05:39:17.738265 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:17.739451 env[1199]: time="2025-10-29T05:39:17.739065177Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 05:39:17.739554 kubelet[2003]: E1029 05:39:17.739063 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wm5qr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:17.742075 kubelet[2003]: E1029 05:39:17.742023 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:18.058838 env[1199]: time="2025-10-29T05:39:18.058572962Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:18.060529 env[1199]: time="2025-10-29T05:39:18.060439413Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 05:39:18.061018 kubelet[2003]: E1029 05:39:18.060934 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:18.061159 kubelet[2003]: E1029 05:39:18.061035 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:18.062014 env[1199]: time="2025-10-29T05:39:18.061608093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 05:39:18.063862 kubelet[2003]: E1029 05:39:18.063280 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:18.390456 env[1199]: time="2025-10-29T05:39:18.390316391Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:18.391625 env[1199]: time="2025-10-29T05:39:18.391538008Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 05:39:18.392070 kubelet[2003]: E1029 05:39:18.391967 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:18.392070 kubelet[2003]: E1029 05:39:18.392037 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:18.392407 kubelet[2003]: E1029 05:39:18.392309 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-b9gfx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:18.393417 env[1199]: time="2025-10-29T05:39:18.393380187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 05:39:18.393865 kubelet[2003]: E1029 05:39:18.393809 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:18.702459 env[1199]: time="2025-10-29T05:39:18.702287128Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:18.704418 env[1199]: time="2025-10-29T05:39:18.704198797Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 05:39:18.705741 kubelet[2003]: E1029 05:39:18.704813 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:18.705741 kubelet[2003]: E1029 05:39:18.704903 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:18.705741 kubelet[2003]: E1029 05:39:18.705122 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:18.706871 kubelet[2003]: E1029 05:39:18.706811 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:39:25.423022 env[1199]: time="2025-10-29T05:39:25.422937368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 05:39:25.731219 env[1199]: time="2025-10-29T05:39:25.730842850Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:25.733333 env[1199]: time="2025-10-29T05:39:25.733211833Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 05:39:25.733876 kubelet[2003]: E1029 05:39:25.733795 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:25.734642 kubelet[2003]: E1029 05:39:25.734596 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:25.735235 kubelet[2003]: E1029 05:39:25.735054 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2425b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:25.737164 kubelet[2003]: E1029 05:39:25.737106 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:28.424397 kubelet[2003]: E1029 05:39:28.423746 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:29.421768 kubelet[2003]: E1029 05:39:29.421709 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:30.148675 systemd[1]: Started sshd@8-10.244.11.46:22-147.75.109.163:47072.service. Oct 29 05:39:30.159765 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 29 05:39:30.159998 kernel: audit: type=1130 audit(1761716370.148:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.46:22-147.75.109.163:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:30.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.46:22-147.75.109.163:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:30.424260 kubelet[2003]: E1029 05:39:30.424108 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:30.426395 kubelet[2003]: E1029 05:39:30.426347 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:39:30.426589 kubelet[2003]: E1029 05:39:30.426398 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:39:31.125377 sshd[4606]: Accepted publickey for core from 147.75.109.163 port 47072 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:31.136606 kernel: audit: type=1101 audit(1761716371.124:1366): pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.124000 audit[4606]: USER_ACCT pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.139418 sshd[4606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:31.136000 audit[4606]: CRED_ACQ pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.149947 kernel: audit: type=1103 audit(1761716371.136:1367): pid=4606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.167599 kernel: audit: type=1006 audit(1761716371.136:1368): pid=4606 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 29 05:39:31.168169 kernel: audit: type=1300 audit(1761716371.136:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedabf0fd0 a2=3 a3=0 items=0 ppid=1 pid=4606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:31.136000 audit[4606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedabf0fd0 a2=3 a3=0 items=0 ppid=1 pid=4606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:31.172022 systemd-logind[1187]: New session 8 of user core. Oct 29 05:39:31.176292 kernel: audit: type=1327 audit(1761716371.136:1368): proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:31.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:31.176465 systemd[1]: Started session-8.scope. Oct 29 05:39:31.186000 audit[4606]: USER_START pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.196950 kernel: audit: type=1105 audit(1761716371.186:1369): pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.189000 audit[4611]: CRED_ACQ pid=4611 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:31.204017 kernel: audit: type=1103 audit(1761716371.189:1370): pid=4611 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:32.547507 sshd[4606]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:32.549000 audit[4606]: USER_END pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:32.560491 kernel: audit: type=1106 audit(1761716372.549:1371): pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:32.552663 systemd[1]: sshd@8-10.244.11.46:22-147.75.109.163:47072.service: Deactivated successfully. Oct 29 05:39:32.560306 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. Oct 29 05:39:32.561661 systemd[1]: session-8.scope: Deactivated successfully. Oct 29 05:39:32.549000 audit[4606]: CRED_DISP pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:32.570544 kernel: audit: type=1104 audit(1761716372.549:1372): pid=4606 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:32.569795 systemd-logind[1187]: Removed session 8. Oct 29 05:39:32.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.46:22-147.75.109.163:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:36.439025 kubelet[2003]: E1029 05:39:36.438881 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:37.678783 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 05:39:37.679926 kernel: audit: type=1130 audit(1761716377.672:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.46:22-147.75.109.163:60562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:37.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.46:22-147.75.109.163:60562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:37.673086 systemd[1]: Started sshd@9-10.244.11.46:22-147.75.109.163:60562.service. Oct 29 05:39:38.609000 audit[4623]: USER_ACCT pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.613434 sshd[4623]: Accepted publickey for core from 147.75.109.163 port 60562 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:38.616000 audit[4623]: CRED_ACQ pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.619300 sshd[4623]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:38.624654 kernel: audit: type=1101 audit(1761716378.609:1375): pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.625028 kernel: audit: type=1103 audit(1761716378.616:1376): pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.625112 kernel: audit: type=1006 audit(1761716378.616:1377): pid=4623 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 29 05:39:38.616000 audit[4623]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefa244b70 a2=3 a3=0 items=0 ppid=1 pid=4623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:38.635210 kernel: audit: type=1300 audit(1761716378.616:1377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefa244b70 a2=3 a3=0 items=0 ppid=1 pid=4623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:38.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:38.638010 kernel: audit: type=1327 audit(1761716378.616:1377): proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:38.641026 systemd-logind[1187]: New session 9 of user core. Oct 29 05:39:38.642385 systemd[1]: Started session-9.scope. Oct 29 05:39:38.650000 audit[4623]: USER_START pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.658000 audit[4625]: CRED_ACQ pid=4625 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.665742 kernel: audit: type=1105 audit(1761716378.650:1378): pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:38.665918 kernel: audit: type=1103 audit(1761716378.658:1379): pid=4625 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:39.425943 env[1199]: time="2025-10-29T05:39:39.425803628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:39.430524 sshd[4623]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:39.434000 audit[4623]: USER_END pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:39.443023 kernel: audit: type=1106 audit(1761716379.434:1380): pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:39.443490 systemd[1]: sshd@9-10.244.11.46:22-147.75.109.163:60562.service: Deactivated successfully. Oct 29 05:39:39.444872 systemd[1]: session-9.scope: Deactivated successfully. Oct 29 05:39:39.447145 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. Oct 29 05:39:39.455475 kernel: audit: type=1104 audit(1761716379.434:1381): pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:39.434000 audit[4623]: CRED_DISP pid=4623 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:39.456154 systemd-logind[1187]: Removed session 9. Oct 29 05:39:39.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.46:22-147.75.109.163:60562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:39.770290 env[1199]: time="2025-10-29T05:39:39.770063531Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:39.771521 env[1199]: time="2025-10-29T05:39:39.771299679Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:39.771891 kubelet[2003]: E1029 05:39:39.771818 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:39.773839 kubelet[2003]: E1029 05:39:39.773796 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:39.775523 kubelet[2003]: E1029 05:39:39.775441 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wm5qr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:39.777021 kubelet[2003]: E1029 05:39:39.776960 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:40.422905 env[1199]: time="2025-10-29T05:39:40.422549952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:39:40.743733 env[1199]: time="2025-10-29T05:39:40.743418551Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:40.745037 env[1199]: time="2025-10-29T05:39:40.744899285Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:39:40.745521 kubelet[2003]: E1029 05:39:40.745441 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:40.745945 kubelet[2003]: E1029 05:39:40.745715 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:39:40.746452 kubelet[2003]: E1029 05:39:40.746355 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sq27z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:40.747940 kubelet[2003]: E1029 05:39:40.747864 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:44.422721 env[1199]: time="2025-10-29T05:39:44.422663473Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 05:39:44.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.11.46:22-147.75.109.163:44598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:44.581858 systemd[1]: Started sshd@10-10.244.11.46:22-147.75.109.163:44598.service. Oct 29 05:39:44.583985 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 05:39:44.584081 kernel: audit: type=1130 audit(1761716384.581:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.11.46:22-147.75.109.163:44598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:44.744220 env[1199]: time="2025-10-29T05:39:44.743379288Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:44.745461 env[1199]: time="2025-10-29T05:39:44.745340778Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 05:39:44.746546 kubelet[2003]: E1029 05:39:44.746097 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:44.746546 kubelet[2003]: E1029 05:39:44.746237 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:39:44.747140 kubelet[2003]: E1029 05:39:44.746697 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-b9gfx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:44.749213 env[1199]: time="2025-10-29T05:39:44.748992215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 05:39:44.749747 kubelet[2003]: E1029 05:39:44.749644 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:45.073722 env[1199]: time="2025-10-29T05:39:45.073534836Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:45.075205 env[1199]: time="2025-10-29T05:39:45.075128458Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 05:39:45.075626 kubelet[2003]: E1029 05:39:45.075565 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:45.075832 kubelet[2003]: E1029 05:39:45.075781 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:39:45.076288 kubelet[2003]: E1029 05:39:45.076215 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:45.079965 env[1199]: time="2025-10-29T05:39:45.079877404Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 05:39:45.409876 env[1199]: time="2025-10-29T05:39:45.409732143Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:45.411209 env[1199]: time="2025-10-29T05:39:45.411082444Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 05:39:45.411813 kubelet[2003]: E1029 05:39:45.411739 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:45.412056 kubelet[2003]: E1029 05:39:45.412000 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:39:45.413182 kubelet[2003]: E1029 05:39:45.413113 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:45.414777 kubelet[2003]: E1029 05:39:45.414667 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:39:45.423668 env[1199]: time="2025-10-29T05:39:45.423594203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 05:39:45.491000 audit[4644]: USER_ACCT pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.493264 sshd[4644]: Accepted publickey for core from 147.75.109.163 port 44598 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:45.499972 kernel: audit: type=1101 audit(1761716385.491:1384): pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.500000 audit[4644]: CRED_ACQ pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.502387 sshd[4644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:45.512411 kernel: audit: type=1103 audit(1761716385.500:1385): pid=4644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.512536 kernel: audit: type=1006 audit(1761716385.500:1386): pid=4644 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 29 05:39:45.512769 kernel: audit: type=1300 audit(1761716385.500:1386): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcbd75b60 a2=3 a3=0 items=0 ppid=1 pid=4644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:45.500000 audit[4644]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcbd75b60 a2=3 a3=0 items=0 ppid=1 pid=4644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:45.521950 kernel: audit: type=1327 audit(1761716385.500:1386): proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:45.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:45.523550 systemd-logind[1187]: New session 10 of user core. Oct 29 05:39:45.524390 systemd[1]: Started session-10.scope. Oct 29 05:39:45.533000 audit[4644]: USER_START pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.543048 kernel: audit: type=1105 audit(1761716385.533:1387): pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.539000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.553597 kernel: audit: type=1103 audit(1761716385.539:1388): pid=4646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:45.731717 env[1199]: time="2025-10-29T05:39:45.731379675Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:45.735346 env[1199]: time="2025-10-29T05:39:45.735229772Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 05:39:45.736091 kubelet[2003]: E1029 05:39:45.736025 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:45.736250 kubelet[2003]: E1029 05:39:45.736124 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:39:45.736424 kubelet[2003]: E1029 05:39:45.736342 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:0223bd01080849479eb5b60307f8d685,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:45.739255 env[1199]: time="2025-10-29T05:39:45.739217631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 05:39:46.083055 env[1199]: time="2025-10-29T05:39:46.082822750Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:46.084734 env[1199]: time="2025-10-29T05:39:46.084640133Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 05:39:46.085488 kubelet[2003]: E1029 05:39:46.085428 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:46.086124 kubelet[2003]: E1029 05:39:46.086079 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:39:46.086547 kubelet[2003]: E1029 05:39:46.086465 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:46.088281 kubelet[2003]: E1029 05:39:46.088214 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:39:46.233544 sshd[4644]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:46.234000 audit[4644]: USER_END pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:46.243974 kernel: audit: type=1106 audit(1761716386.234:1389): pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:46.244241 systemd[1]: sshd@10-10.244.11.46:22-147.75.109.163:44598.service: Deactivated successfully. Oct 29 05:39:46.245703 systemd[1]: session-10.scope: Deactivated successfully. Oct 29 05:39:46.234000 audit[4644]: CRED_DISP pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:46.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.11.46:22-147.75.109.163:44598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:46.253072 kernel: audit: type=1104 audit(1761716386.234:1390): pid=4644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:46.252859 systemd-logind[1187]: Session 10 logged out. Waiting for processes to exit. Oct 29 05:39:46.254241 systemd-logind[1187]: Removed session 10. Oct 29 05:39:48.424951 env[1199]: time="2025-10-29T05:39:48.424757788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 05:39:48.751689 env[1199]: time="2025-10-29T05:39:48.750873889Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:39:48.752902 env[1199]: time="2025-10-29T05:39:48.752664985Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 05:39:48.753197 kubelet[2003]: E1029 05:39:48.753127 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:48.753834 kubelet[2003]: E1029 05:39:48.753223 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:39:48.753834 kubelet[2003]: E1029 05:39:48.753597 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2425b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 05:39:48.755466 kubelet[2003]: E1029 05:39:48.755425 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:39:51.386994 systemd[1]: Started sshd@11-10.244.11.46:22-147.75.109.163:40984.service. Oct 29 05:39:51.395272 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 05:39:51.395341 kernel: audit: type=1130 audit(1761716391.386:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.46:22-147.75.109.163:40984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:51.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.46:22-147.75.109.163:40984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:51.426108 kubelet[2003]: E1029 05:39:51.425997 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:39:52.303000 audit[4659]: USER_ACCT pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.311505 sshd[4659]: Accepted publickey for core from 147.75.109.163 port 40984 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:52.312148 kernel: audit: type=1101 audit(1761716392.303:1393): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.310000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.312512 sshd[4659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:52.333144 kernel: audit: type=1103 audit(1761716392.310:1394): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.344164 kernel: audit: type=1006 audit(1761716392.310:1395): pid=4659 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 29 05:39:52.310000 audit[4659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a37b830 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:52.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:52.357189 kernel: audit: type=1300 audit(1761716392.310:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a37b830 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:52.357311 kernel: audit: type=1327 audit(1761716392.310:1395): proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:52.357477 systemd-logind[1187]: New session 11 of user core. Oct 29 05:39:52.358481 systemd[1]: Started session-11.scope. Oct 29 05:39:52.367000 audit[4659]: USER_START pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.375000 audit[4661]: CRED_ACQ pid=4661 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.383132 kernel: audit: type=1105 audit(1761716392.367:1396): pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:52.383327 kernel: audit: type=1103 audit(1761716392.375:1397): pid=4661 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:53.085229 sshd[4659]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:53.088000 audit[4659]: USER_END pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:53.097124 kernel: audit: type=1106 audit(1761716393.088:1398): pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:53.089000 audit[4659]: CRED_DISP pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:53.103948 kernel: audit: type=1104 audit(1761716393.089:1399): pid=4659 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:53.104477 systemd[1]: sshd@11-10.244.11.46:22-147.75.109.163:40984.service: Deactivated successfully. Oct 29 05:39:53.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.46:22-147.75.109.163:40984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:53.105700 systemd[1]: session-11.scope: Deactivated successfully. Oct 29 05:39:53.106737 systemd-logind[1187]: Session 11 logged out. Waiting for processes to exit. Oct 29 05:39:53.108388 systemd-logind[1187]: Removed session 11. Oct 29 05:39:53.235251 systemd[1]: Started sshd@12-10.244.11.46:22-147.75.109.163:40986.service. Oct 29 05:39:53.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.11.46:22-147.75.109.163:40986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:53.425452 kubelet[2003]: E1029 05:39:53.425371 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:39:54.156000 audit[4672]: USER_ACCT pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.158134 sshd[4672]: Accepted publickey for core from 147.75.109.163 port 40986 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:54.158000 audit[4672]: CRED_ACQ pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.159000 audit[4672]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff63456940 a2=3 a3=0 items=0 ppid=1 pid=4672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:54.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:54.161370 sshd[4672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:54.170035 systemd-logind[1187]: New session 12 of user core. Oct 29 05:39:54.170492 systemd[1]: Started session-12.scope. Oct 29 05:39:54.177000 audit[4672]: USER_START pid=4672 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.180000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.953264 sshd[4672]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:54.954000 audit[4672]: USER_END pid=4672 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.955000 audit[4672]: CRED_DISP pid=4672 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:54.959154 systemd[1]: sshd@12-10.244.11.46:22-147.75.109.163:40986.service: Deactivated successfully. Oct 29 05:39:54.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.11.46:22-147.75.109.163:40986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:54.960390 systemd[1]: session-12.scope: Deactivated successfully. Oct 29 05:39:54.961525 systemd-logind[1187]: Session 12 logged out. Waiting for processes to exit. Oct 29 05:39:54.963594 systemd-logind[1187]: Removed session 12. Oct 29 05:39:55.105074 systemd[1]: Started sshd@13-10.244.11.46:22-147.75.109.163:40990.service. Oct 29 05:39:55.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.46:22-147.75.109.163:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:55.422498 kubelet[2003]: E1029 05:39:55.422426 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:39:56.005000 audit[4681]: USER_ACCT pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.007000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.008770 sshd[4681]: Accepted publickey for core from 147.75.109.163 port 40990 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:39:56.007000 audit[4681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb7d6440 a2=3 a3=0 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:39:56.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:39:56.009420 sshd[4681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:39:56.019356 systemd[1]: Started session-13.scope. Oct 29 05:39:56.021274 systemd-logind[1187]: New session 13 of user core. Oct 29 05:39:56.029000 audit[4681]: USER_START pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.032000 audit[4683]: CRED_ACQ pid=4683 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.742053 sshd[4681]: pam_unix(sshd:session): session closed for user core Oct 29 05:39:56.744000 audit[4681]: USER_END pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.753171 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 29 05:39:56.753296 kernel: audit: type=1106 audit(1761716396.744:1416): pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.750378 systemd[1]: sshd@13-10.244.11.46:22-147.75.109.163:40990.service: Deactivated successfully. Oct 29 05:39:56.752396 systemd[1]: session-13.scope: Deactivated successfully. Oct 29 05:39:56.744000 audit[4681]: CRED_DISP pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.765956 kernel: audit: type=1104 audit(1761716396.744:1417): pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:39:56.766082 kernel: audit: type=1131 audit(1761716396.749:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.46:22-147.75.109.163:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:56.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.46:22-147.75.109.163:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:39:56.766356 systemd-logind[1187]: Session 13 logged out. Waiting for processes to exit. Oct 29 05:39:56.773012 systemd-logind[1187]: Removed session 13. Oct 29 05:39:58.752118 systemd[1]: run-containerd-runc-k8s.io-c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64-runc.QnbIQv.mount: Deactivated successfully. Oct 29 05:40:00.433041 kubelet[2003]: E1029 05:40:00.432938 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:40:00.434280 kubelet[2003]: E1029 05:40:00.434224 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:40:01.422465 kubelet[2003]: E1029 05:40:01.422326 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:40:01.659000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:01.659000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:01.677034 kernel: audit: type=1400 audit(1761716401.659:1420): avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:01.677366 kernel: audit: type=1400 audit(1761716401.659:1419): avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:01.677526 kernel: audit: type=1300 audit(1761716401.659:1419): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0035966a0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:01.659000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0035966a0 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:01.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:01.693953 kernel: audit: type=1327 audit(1761716401.659:1419): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:01.659000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027c0f90 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:01.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:01.710526 kernel: audit: type=1300 audit(1761716401.659:1420): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027c0f90 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:01.710698 kernel: audit: type=1327 audit(1761716401.659:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:01.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.46:22-147.75.109.163:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:01.897308 systemd[1]: Started sshd@14-10.244.11.46:22-147.75.109.163:40032.service. Oct 29 05:40:01.903983 kernel: audit: type=1130 audit(1761716401.896:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.46:22-147.75.109.163:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:02.842000 audit[4722]: USER_ACCT pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.844700 sshd[4722]: Accepted publickey for core from 147.75.109.163 port 40032 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:02.849000 audit[4722]: CRED_ACQ pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.852732 sshd[4722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:02.857220 kernel: audit: type=1101 audit(1761716402.842:1422): pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.857354 kernel: audit: type=1103 audit(1761716402.849:1423): pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.857439 kernel: audit: type=1006 audit(1761716402.850:1424): pid=4722 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 29 05:40:02.850000 audit[4722]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcabe8660 a2=3 a3=0 items=0 ppid=1 pid=4722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:02.868338 kernel: audit: type=1300 audit(1761716402.850:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcabe8660 a2=3 a3=0 items=0 ppid=1 pid=4722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:02.850000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:02.871181 kernel: audit: type=1327 audit(1761716402.850:1424): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:02.878767 systemd-logind[1187]: New session 14 of user core. Oct 29 05:40:02.879499 systemd[1]: Started session-14.scope. Oct 29 05:40:02.887000 audit[4722]: USER_START pid=4722 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.897815 kernel: audit: type=1105 audit(1761716402.887:1425): pid=4722 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.897985 kernel: audit: type=1103 audit(1761716402.896:1426): pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:02.896000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:03.395000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525840 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.395000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c010ffe9f0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.411193 kernel: audit: type=1400 audit(1761716403.395:1427): avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525840 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.411758 kernel: audit: type=1300 audit(1761716403.395:1427): arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c010ffe9f0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.395000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.396000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.396000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0105b76e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.396000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.401000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.401000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0105dda60 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.401000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.413000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.413000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0105b77a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.413000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.414000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.414000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c010efb400 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.414000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.425000 audit[1864]: AVC avc: denied { watch } for pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525846 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:03.425000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0105b7800 a2=fc6 a3=0 items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c455 key=(null) Oct 29 05:40:03.425000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 29 05:40:03.668326 sshd[4722]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:03.672000 audit[4722]: USER_END pid=4722 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:03.672000 audit[4722]: CRED_DISP pid=4722 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:03.676320 systemd[1]: sshd@14-10.244.11.46:22-147.75.109.163:40032.service: Deactivated successfully. Oct 29 05:40:03.677852 systemd[1]: session-14.scope: Deactivated successfully. Oct 29 05:40:03.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.46:22-147.75.109.163:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:03.678999 systemd-logind[1187]: Session 14 logged out. Waiting for processes to exit. Oct 29 05:40:03.681767 systemd-logind[1187]: Removed session 14. Oct 29 05:40:05.422343 kubelet[2003]: E1029 05:40:05.422260 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:40:06.519000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:06.519000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003596e00 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:06.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:06.520000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:06.520000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003678200 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:06.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:06.520000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:06.520000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003678220 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:06.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:06.521000 audit[1872]: AVC avc: denied { watch } for pid=1872 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 05:40:06.521000 audit[1872]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003678240 a2=fc6 a3=0 items=0 ppid=1723 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c503 key=(null) Oct 29 05:40:06.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 05:40:08.429645 kubelet[2003]: E1029 05:40:08.429573 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:40:08.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.46:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:08.817671 systemd[1]: Started sshd@15-10.244.11.46:22-147.75.109.163:40044.service. Oct 29 05:40:08.819952 kernel: kauditd_printk_skb: 31 callbacks suppressed Oct 29 05:40:08.820077 kernel: audit: type=1130 audit(1761716408.817:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.46:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:09.421774 kubelet[2003]: E1029 05:40:09.421702 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:40:09.733000 audit[4736]: USER_ACCT pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.736813 sshd[4736]: Accepted publickey for core from 147.75.109.163 port 40044 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:09.741948 kernel: audit: type=1101 audit(1761716409.733:1441): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.741000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.742709 sshd[4736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:09.752451 kernel: audit: type=1103 audit(1761716409.741:1442): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.756955 kernel: audit: type=1006 audit(1761716409.741:1443): pid=4736 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 29 05:40:09.741000 audit[4736]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0b35cc20 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:09.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:09.766492 kernel: audit: type=1300 audit(1761716409.741:1443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0b35cc20 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:09.766619 kernel: audit: type=1327 audit(1761716409.741:1443): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:09.773003 systemd-logind[1187]: New session 15 of user core. Oct 29 05:40:09.773890 systemd[1]: Started session-15.scope. Oct 29 05:40:09.780000 audit[4736]: USER_START pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.790962 kernel: audit: type=1105 audit(1761716409.780:1444): pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.790000 audit[4738]: CRED_ACQ pid=4738 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:09.797951 kernel: audit: type=1103 audit(1761716409.790:1445): pid=4738 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:10.203416 env[1199]: time="2025-10-29T05:40:10.203308206Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:40:10.586846 sshd[4736]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:10.591000 audit[4736]: USER_END pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:10.600971 kernel: audit: type=1106 audit(1761716410.591:1446): pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:10.600000 audit[4736]: CRED_DISP pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:10.603465 systemd[1]: sshd@15-10.244.11.46:22-147.75.109.163:40044.service: Deactivated successfully. Oct 29 05:40:10.604768 systemd[1]: session-15.scope: Deactivated successfully. Oct 29 05:40:10.608071 kernel: audit: type=1104 audit(1761716410.600:1447): pid=4736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:10.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.46:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:10.609032 systemd-logind[1187]: Session 15 logged out. Waiting for processes to exit. Oct 29 05:40:10.610620 systemd-logind[1187]: Removed session 15. Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.446 [WARNING][4754] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0", GenerateName:"calico-kube-controllers-8cf699dc5-", Namespace:"calico-system", SelfLink:"", UID:"8893c55d-6f83-44df-994b-b713e5abd120", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8cf699dc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577", Pod:"calico-kube-controllers-8cf699dc5-hszxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.119.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic6b3ea496ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.455 [INFO][4754] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.455 [INFO][4754] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" iface="eth0" netns="" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.455 [INFO][4754] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.455 [INFO][4754] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.656 [INFO][4762] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.656 [INFO][4762] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.656 [INFO][4762] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.671 [WARNING][4762] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.671 [INFO][4762] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.673 [INFO][4762] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:40:10.679358 env[1199]: 2025-10-29 05:40:10.675 [INFO][4754] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.680430 env[1199]: time="2025-10-29T05:40:10.679419412Z" level=info msg="TearDown network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" successfully" Oct 29 05:40:10.680430 env[1199]: time="2025-10-29T05:40:10.679469753Z" level=info msg="StopPodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" returns successfully" Oct 29 05:40:10.699416 env[1199]: time="2025-10-29T05:40:10.699352451Z" level=info msg="RemovePodSandbox for \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:40:10.699643 env[1199]: time="2025-10-29T05:40:10.699432204Z" level=info msg="Forcibly stopping sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\"" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.781 [WARNING][4778] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0", GenerateName:"calico-kube-controllers-8cf699dc5-", Namespace:"calico-system", SelfLink:"", UID:"8893c55d-6f83-44df-994b-b713e5abd120", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 5, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8cf699dc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-gd80c.gb1.brightbox.com", ContainerID:"00dd1e730c38a429c2e558094464426e3ad957bc353c626f0c3d2c428648d577", Pod:"calico-kube-controllers-8cf699dc5-hszxg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.119.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic6b3ea496ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.782 [INFO][4778] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.782 [INFO][4778] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" iface="eth0" netns="" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.782 [INFO][4778] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.782 [INFO][4778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.830 [INFO][4785] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.831 [INFO][4785] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.831 [INFO][4785] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.846 [WARNING][4785] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.847 [INFO][4785] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" HandleID="k8s-pod-network.26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Workload="srv--gd80c.gb1.brightbox.com-k8s-calico--kube--controllers--8cf699dc5--hszxg-eth0" Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.850 [INFO][4785] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 05:40:10.856139 env[1199]: 2025-10-29 05:40:10.853 [INFO][4778] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018" Oct 29 05:40:10.857533 env[1199]: time="2025-10-29T05:40:10.857477615Z" level=info msg="TearDown network for sandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" successfully" Oct 29 05:40:10.862454 env[1199]: time="2025-10-29T05:40:10.862384371Z" level=info msg="RemovePodSandbox \"26096023cbcb6590a9db624b68420757a0d0e048d804bddc24e1a71fc168d018\" returns successfully" Oct 29 05:40:11.423314 kubelet[2003]: E1029 05:40:11.423241 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:40:13.423327 kubelet[2003]: E1029 05:40:13.423240 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:40:15.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.11.46:22-147.75.109.163:52792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:15.730809 systemd[1]: Started sshd@16-10.244.11.46:22-147.75.109.163:52792.service. Oct 29 05:40:15.737394 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 05:40:15.737500 kernel: audit: type=1130 audit(1761716415.730:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.11.46:22-147.75.109.163:52792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:16.423006 kubelet[2003]: E1029 05:40:16.422905 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:40:16.681000 audit[4794]: USER_ACCT pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.683500 sshd[4794]: Accepted publickey for core from 147.75.109.163 port 52792 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:16.689953 kernel: audit: type=1101 audit(1761716416.681:1450): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.690000 audit[4794]: CRED_ACQ pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.701614 kernel: audit: type=1103 audit(1761716416.690:1451): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.701741 kernel: audit: type=1006 audit(1761716416.690:1452): pid=4794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 29 05:40:16.701806 kernel: audit: type=1300 audit(1761716416.690:1452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e95ffe0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:16.690000 audit[4794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e95ffe0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:16.702610 sshd[4794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:16.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:16.712092 kernel: audit: type=1327 audit(1761716416.690:1452): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:16.717377 systemd[1]: Started session-16.scope. Oct 29 05:40:16.718176 systemd-logind[1187]: New session 16 of user core. Oct 29 05:40:16.725000 audit[4794]: USER_START pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.729000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.754492 kernel: audit: type=1105 audit(1761716416.725:1453): pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:16.754725 kernel: audit: type=1103 audit(1761716416.729:1454): pid=4796 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:17.553974 sshd[4794]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:17.556000 audit[4794]: USER_END pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:17.559457 systemd-logind[1187]: Session 16 logged out. Waiting for processes to exit. Oct 29 05:40:17.560866 systemd[1]: sshd@16-10.244.11.46:22-147.75.109.163:52792.service: Deactivated successfully. Oct 29 05:40:17.564945 kernel: audit: type=1106 audit(1761716417.556:1455): pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:17.566422 kernel: audit: type=1104 audit(1761716417.556:1456): pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:17.556000 audit[4794]: CRED_DISP pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:17.565851 systemd[1]: session-16.scope: Deactivated successfully. Oct 29 05:40:17.567819 systemd-logind[1187]: Removed session 16. Oct 29 05:40:17.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.11.46:22-147.75.109.163:52792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:19.422231 kubelet[2003]: E1029 05:40:19.422163 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:40:21.424090 env[1199]: time="2025-10-29T05:40:21.423977566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:40:21.732948 env[1199]: time="2025-10-29T05:40:21.732509090Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:21.734011 env[1199]: time="2025-10-29T05:40:21.733805292Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:40:21.734335 kubelet[2003]: E1029 05:40:21.734229 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:40:21.734959 kubelet[2003]: E1029 05:40:21.734367 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:40:21.734959 kubelet[2003]: E1029 05:40:21.734716 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wm5qr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-tjm6f_calico-apiserver(1215c1dc-2e72-4d1b-9366-b75eae9af1f6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:21.736570 kubelet[2003]: E1029 05:40:21.736504 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:40:22.706141 systemd[1]: Started sshd@17-10.244.11.46:22-147.75.109.163:59738.service. Oct 29 05:40:22.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.46:22-147.75.109.163:59738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:22.714511 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 05:40:22.714619 kernel: audit: type=1130 audit(1761716422.706:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.46:22-147.75.109.163:59738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:23.621000 audit[4805]: USER_ACCT pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.623260 sshd[4805]: Accepted publickey for core from 147.75.109.163 port 59738 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:23.629944 kernel: audit: type=1101 audit(1761716423.621:1459): pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.630000 audit[4805]: CRED_ACQ pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.638714 sshd[4805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:23.642380 kernel: audit: type=1103 audit(1761716423.630:1460): pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.643263 kernel: audit: type=1006 audit(1761716423.630:1461): pid=4805 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 29 05:40:23.643338 kernel: audit: type=1300 audit(1761716423.630:1461): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9b1d270 a2=3 a3=0 items=0 ppid=1 pid=4805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:23.630000 audit[4805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9b1d270 a2=3 a3=0 items=0 ppid=1 pid=4805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:23.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:23.651894 kernel: audit: type=1327 audit(1761716423.630:1461): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:23.655983 systemd-logind[1187]: New session 17 of user core. Oct 29 05:40:23.658001 systemd[1]: Started session-17.scope. Oct 29 05:40:23.666000 audit[4805]: USER_START pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.674961 kernel: audit: type=1105 audit(1761716423.666:1462): pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.674000 audit[4807]: CRED_ACQ pid=4807 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:23.682023 kernel: audit: type=1103 audit(1761716423.674:1463): pid=4807 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:24.368336 sshd[4805]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:24.369000 audit[4805]: USER_END pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:24.372661 systemd[1]: sshd@17-10.244.11.46:22-147.75.109.163:59738.service: Deactivated successfully. Oct 29 05:40:24.374122 systemd[1]: session-17.scope: Deactivated successfully. Oct 29 05:40:24.378929 kernel: audit: type=1106 audit(1761716424.369:1464): pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:24.379693 systemd-logind[1187]: Session 17 logged out. Waiting for processes to exit. Oct 29 05:40:24.381246 systemd-logind[1187]: Removed session 17. Oct 29 05:40:24.369000 audit[4805]: CRED_DISP pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:24.387933 kernel: audit: type=1104 audit(1761716424.369:1465): pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:24.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.46:22-147.75.109.163:59738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:24.422629 kubelet[2003]: E1029 05:40:24.422489 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:40:24.424723 kubelet[2003]: E1029 05:40:24.424661 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:40:24.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.11.46:22-147.75.109.163:59740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:24.520129 systemd[1]: Started sshd@18-10.244.11.46:22-147.75.109.163:59740.service. Oct 29 05:40:25.420000 audit[4823]: USER_ACCT pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:25.422403 sshd[4823]: Accepted publickey for core from 147.75.109.163 port 59740 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:25.422000 audit[4823]: CRED_ACQ pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:25.423000 audit[4823]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc926b7b00 a2=3 a3=0 items=0 ppid=1 pid=4823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:25.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:25.424943 sshd[4823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:25.432457 systemd-logind[1187]: New session 18 of user core. Oct 29 05:40:25.433356 systemd[1]: Started session-18.scope. Oct 29 05:40:25.442000 audit[4823]: USER_START pid=4823 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:25.444000 audit[4825]: CRED_ACQ pid=4825 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:26.423871 env[1199]: time="2025-10-29T05:40:26.423781935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 05:40:26.620372 sshd[4823]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:26.626000 audit[4823]: USER_END pid=4823 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:26.627000 audit[4823]: CRED_DISP pid=4823 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:26.632818 systemd[1]: sshd@18-10.244.11.46:22-147.75.109.163:59740.service: Deactivated successfully. Oct 29 05:40:26.634024 systemd[1]: session-18.scope: Deactivated successfully. Oct 29 05:40:26.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.11.46:22-147.75.109.163:59740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:26.635243 systemd-logind[1187]: Session 18 logged out. Waiting for processes to exit. Oct 29 05:40:26.636963 systemd-logind[1187]: Removed session 18. Oct 29 05:40:26.734501 env[1199]: time="2025-10-29T05:40:26.732992604Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:26.741445 env[1199]: time="2025-10-29T05:40:26.741343773Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 05:40:26.742073 kubelet[2003]: E1029 05:40:26.741984 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:40:26.742744 kubelet[2003]: E1029 05:40:26.742692 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 05:40:26.743342 kubelet[2003]: E1029 05:40:26.743268 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:26.746019 env[1199]: time="2025-10-29T05:40:26.745974480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 05:40:26.761522 systemd[1]: Started sshd@19-10.244.11.46:22-147.75.109.163:59744.service. Oct 29 05:40:26.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.11.46:22-147.75.109.163:59744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:27.082651 env[1199]: time="2025-10-29T05:40:27.082173870Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:27.084106 env[1199]: time="2025-10-29T05:40:27.083884575Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 05:40:27.086303 kubelet[2003]: E1029 05:40:27.086227 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:40:27.086404 kubelet[2003]: E1029 05:40:27.086320 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 05:40:27.086750 kubelet[2003]: E1029 05:40:27.086656 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-k7gk4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-5lk8x_calico-system(5092f51d-06fc-4dab-b0c4-32dc46cf7538): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:27.088518 kubelet[2003]: E1029 05:40:27.088458 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:40:27.689697 sshd[4833]: Accepted publickey for core from 147.75.109.163 port 59744 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:27.688000 audit[4833]: USER_ACCT pid=4833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:27.690000 audit[4833]: CRED_ACQ pid=4833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:27.690000 audit[4833]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb62adae0 a2=3 a3=0 items=0 ppid=1 pid=4833 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:27.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:27.693284 sshd[4833]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:27.701021 systemd-logind[1187]: New session 19 of user core. Oct 29 05:40:27.702082 systemd[1]: Started session-19.scope. Oct 29 05:40:27.719133 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 29 05:40:27.719334 kernel: audit: type=1105 audit(1761716427.713:1480): pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:27.713000 audit[4833]: USER_START pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:27.724000 audit[4835]: CRED_ACQ pid=4835 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:27.731665 kernel: audit: type=1103 audit(1761716427.724:1481): pid=4835 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:28.770602 systemd[1]: run-containerd-runc-k8s.io-c4e8344ef7770ac5b2ec007b9a1e80de756b616122c7caedfb2a845b198d2e64-runc.Dx7Hzj.mount: Deactivated successfully. Oct 29 05:40:29.347000 audit[4867]: NETFILTER_CFG table=filter:118 family=2 entries=26 op=nft_register_rule pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.358953 kernel: audit: type=1325 audit(1761716429.347:1482): table=filter:118 family=2 entries=26 op=nft_register_rule pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.347000 audit[4867]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffc63d8bb0 a2=0 a3=7fffc63d8b9c items=0 ppid=2112 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.377966 kernel: audit: type=1300 audit(1761716429.347:1482): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffc63d8bb0 a2=0 a3=7fffc63d8b9c items=0 ppid=2112 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.378100 kernel: audit: type=1327 audit(1761716429.347:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.392000 audit[4867]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.398931 kernel: audit: type=1325 audit(1761716429.392:1483): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.392000 audit[4867]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffc63d8bb0 a2=0 a3=0 items=0 ppid=2112 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.413296 kernel: audit: type=1300 audit(1761716429.392:1483): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffc63d8bb0 a2=0 a3=0 items=0 ppid=2112 pid=4867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.413450 kernel: audit: type=1327 audit(1761716429.392:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.419041 sshd[4833]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:29.427000 audit[4833]: USER_END pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:29.436932 kernel: audit: type=1106 audit(1761716429.427:1484): pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:29.439323 systemd[1]: sshd@19-10.244.11.46:22-147.75.109.163:59744.service: Deactivated successfully. Oct 29 05:40:29.440826 systemd[1]: session-19.scope: Deactivated successfully. Oct 29 05:40:29.427000 audit[4833]: CRED_DISP pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:29.449310 kernel: audit: type=1104 audit(1761716429.427:1485): pid=4833 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:29.449785 systemd-logind[1187]: Session 19 logged out. Waiting for processes to exit. Oct 29 05:40:29.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.11.46:22-147.75.109.163:59744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:29.453228 systemd-logind[1187]: Removed session 19. Oct 29 05:40:29.510000 audit[4870]: NETFILTER_CFG table=filter:120 family=2 entries=38 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.510000 audit[4870]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffea4c69490 a2=0 a3=7ffea4c6947c items=0 ppid=2112 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.518000 audit[4870]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:29.518000 audit[4870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffea4c69490 a2=0 a3=0 items=0 ppid=2112 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:29.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:29.566787 systemd[1]: Started sshd@20-10.244.11.46:22-147.75.109.163:59752.service. Oct 29 05:40:29.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.11.46:22-147.75.109.163:59752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:30.511000 audit[4872]: USER_ACCT pid=4872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:30.513473 sshd[4872]: Accepted publickey for core from 147.75.109.163 port 59752 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:30.513000 audit[4872]: CRED_ACQ pid=4872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:30.513000 audit[4872]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ee26010 a2=3 a3=0 items=0 ppid=1 pid=4872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:30.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:30.516994 sshd[4872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:30.527064 systemd-logind[1187]: New session 20 of user core. Oct 29 05:40:30.529343 systemd[1]: Started session-20.scope. Oct 29 05:40:30.541000 audit[4872]: USER_START pid=4872 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:30.544000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:31.474897 env[1199]: time="2025-10-29T05:40:31.474761001Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 05:40:31.792479 env[1199]: time="2025-10-29T05:40:31.792233218Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:31.794102 env[1199]: time="2025-10-29T05:40:31.793948115Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 05:40:31.798919 kubelet[2003]: E1029 05:40:31.796103 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:40:31.799698 kubelet[2003]: E1029 05:40:31.799641 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 05:40:31.800512 kubelet[2003]: E1029 05:40:31.800397 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2425b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-8cf699dc5-hszxg_calico-system(8893c55d-6f83-44df-994b-b713e5abd120): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:31.802060 kubelet[2003]: E1029 05:40:31.802007 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:40:31.922572 sshd[4872]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:31.924000 audit[4872]: USER_END pid=4872 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:31.924000 audit[4872]: CRED_DISP pid=4872 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:31.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.11.46:22-147.75.109.163:59752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:31.928688 systemd[1]: sshd@20-10.244.11.46:22-147.75.109.163:59752.service: Deactivated successfully. Oct 29 05:40:31.930320 systemd-logind[1187]: Session 20 logged out. Waiting for processes to exit. Oct 29 05:40:31.931119 systemd[1]: session-20.scope: Deactivated successfully. Oct 29 05:40:31.933040 systemd-logind[1187]: Removed session 20. Oct 29 05:40:32.081768 systemd[1]: Started sshd@21-10.244.11.46:22-147.75.109.163:43018.service. Oct 29 05:40:32.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.46:22-147.75.109.163:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:33.007997 kernel: kauditd_printk_skb: 19 callbacks suppressed Oct 29 05:40:33.008188 kernel: audit: type=1101 audit(1761716433.003:1499): pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.003000 audit[4884]: USER_ACCT pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.007246 sshd[4884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:33.009339 sshd[4884]: Accepted publickey for core from 147.75.109.163 port 43018 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:33.005000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.024755 kernel: audit: type=1103 audit(1761716433.005:1500): pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.024964 kernel: audit: type=1006 audit(1761716433.005:1501): pid=4884 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 29 05:40:33.005000 audit[4884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedff1d640 a2=3 a3=0 items=0 ppid=1 pid=4884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:33.034935 kernel: audit: type=1300 audit(1761716433.005:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedff1d640 a2=3 a3=0 items=0 ppid=1 pid=4884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:33.035737 systemd-logind[1187]: New session 21 of user core. Oct 29 05:40:33.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:33.039197 systemd[1]: Started session-21.scope. Oct 29 05:40:33.040030 kernel: audit: type=1327 audit(1761716433.005:1501): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:33.052000 audit[4884]: USER_START pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.062771 kernel: audit: type=1105 audit(1761716433.052:1502): pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.061000 audit[4886]: CRED_ACQ pid=4886 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.069954 kernel: audit: type=1103 audit(1761716433.061:1503): pid=4886 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.422577 env[1199]: time="2025-10-29T05:40:33.422520288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 05:40:33.735519 env[1199]: time="2025-10-29T05:40:33.735312232Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:33.736776 env[1199]: time="2025-10-29T05:40:33.736702201Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 05:40:33.737131 kubelet[2003]: E1029 05:40:33.737035 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:40:33.737675 kubelet[2003]: E1029 05:40:33.737144 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 05:40:33.742926 kubelet[2003]: E1029 05:40:33.737421 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sq27z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-779769bb48-8n95q_calico-apiserver(e6ea8502-2cb9-417e-83f2-d0631b0ba769): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:33.744128 kubelet[2003]: E1029 05:40:33.744058 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:40:33.805060 sshd[4884]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:33.807000 audit[4884]: USER_END pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.810573 systemd[1]: sshd@21-10.244.11.46:22-147.75.109.163:43018.service: Deactivated successfully. Oct 29 05:40:33.812775 systemd-logind[1187]: Session 21 logged out. Waiting for processes to exit. Oct 29 05:40:33.818320 kernel: audit: type=1106 audit(1761716433.807:1504): pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.818443 kernel: audit: type=1104 audit(1761716433.807:1505): pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.807000 audit[4884]: CRED_DISP pid=4884 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:33.817865 systemd[1]: session-21.scope: Deactivated successfully. Oct 29 05:40:33.819813 systemd-logind[1187]: Removed session 21. Oct 29 05:40:33.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.46:22-147.75.109.163:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:33.831938 kernel: audit: type=1131 audit(1761716433.810:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.46:22-147.75.109.163:43018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:35.425024 kubelet[2003]: E1029 05:40:35.424855 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:40:37.429530 env[1199]: time="2025-10-29T05:40:37.428530401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 05:40:37.740355 env[1199]: time="2025-10-29T05:40:37.739848824Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:37.741740 env[1199]: time="2025-10-29T05:40:37.741438719Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 05:40:37.742219 kubelet[2003]: E1029 05:40:37.742138 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:40:37.743118 kubelet[2003]: E1029 05:40:37.742822 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 05:40:37.743603 kubelet[2003]: E1029 05:40:37.743541 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:0223bd01080849479eb5b60307f8d685,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:37.744618 env[1199]: time="2025-10-29T05:40:37.744290341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 05:40:38.276051 env[1199]: time="2025-10-29T05:40:38.275960718Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:38.287699 env[1199]: time="2025-10-29T05:40:38.287581143Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 05:40:38.288442 kubelet[2003]: E1029 05:40:38.288362 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:40:38.288814 kubelet[2003]: E1029 05:40:38.288778 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 05:40:38.289537 kubelet[2003]: E1029 05:40:38.289446 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-b9gfx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-nskqc_calico-system(c6a0ae0a-392f-42e9-8917-4eeb8b86e85c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:38.290872 kubelet[2003]: E1029 05:40:38.290820 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c" Oct 29 05:40:38.291509 env[1199]: time="2025-10-29T05:40:38.291460189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 05:40:38.438800 kubelet[2003]: E1029 05:40:38.438702 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:40:38.605727 env[1199]: time="2025-10-29T05:40:38.605193947Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 05:40:38.606821 env[1199]: time="2025-10-29T05:40:38.606716255Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 05:40:38.607920 kubelet[2003]: E1029 05:40:38.607178 2003 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:40:38.607920 kubelet[2003]: E1029 05:40:38.607381 2003 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 05:40:38.607920 kubelet[2003]: E1029 05:40:38.607752 2003 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zfk8n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-86f7c596bf-pqnfl_calico-system(285f16da-2820-4d93-85eb-6ee81d208cf9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 05:40:38.613395 kubelet[2003]: E1029 05:40:38.609197 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:40:38.972785 systemd[1]: Started sshd@22-10.244.11.46:22-147.75.109.163:43034.service. Oct 29 05:40:38.985008 kernel: audit: type=1130 audit(1761716438.972:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.11.46:22-147.75.109.163:43034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:38.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.11.46:22-147.75.109.163:43034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:39.122000 audit[4905]: NETFILTER_CFG table=filter:122 family=2 entries=26 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:39.128313 kernel: audit: type=1325 audit(1761716439.122:1508): table=filter:122 family=2 entries=26 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:39.136621 kernel: audit: type=1300 audit(1761716439.122:1508): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd25aee170 a2=0 a3=7ffd25aee15c items=0 ppid=2112 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:39.122000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd25aee170 a2=0 a3=7ffd25aee15c items=0 ppid=2112 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:39.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:39.143934 kernel: audit: type=1327 audit(1761716439.122:1508): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:39.145000 audit[4905]: NETFILTER_CFG table=nat:123 family=2 entries=104 op=nft_register_chain pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:39.151956 kernel: audit: type=1325 audit(1761716439.145:1509): table=nat:123 family=2 entries=104 op=nft_register_chain pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 05:40:39.145000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd25aee170 a2=0 a3=7ffd25aee15c items=0 ppid=2112 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:39.162097 kernel: audit: type=1300 audit(1761716439.145:1509): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd25aee170 a2=0 a3=7ffd25aee15c items=0 ppid=2112 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:39.162324 kernel: audit: type=1327 audit(1761716439.145:1509): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:39.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 05:40:39.927000 audit[4902]: USER_ACCT pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:39.929111 sshd[4902]: Accepted publickey for core from 147.75.109.163 port 43034 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:39.936037 kernel: audit: type=1101 audit(1761716439.927:1510): pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:39.936000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:39.944992 kernel: audit: type=1103 audit(1761716439.936:1511): pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:39.945367 sshd[4902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:39.936000 audit[4902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdb21aa40 a2=3 a3=0 items=0 ppid=1 pid=4902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:39.953126 kernel: audit: type=1006 audit(1761716439.936:1512): pid=4902 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 29 05:40:39.936000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:39.959714 systemd-logind[1187]: New session 22 of user core. Oct 29 05:40:39.961232 systemd[1]: Started session-22.scope. Oct 29 05:40:39.973000 audit[4902]: USER_START pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:39.976000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:40.946809 sshd[4902]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:40.949000 audit[4902]: USER_END pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:40.949000 audit[4902]: CRED_DISP pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:40.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.11.46:22-147.75.109.163:43034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:40.953793 systemd[1]: sshd@22-10.244.11.46:22-147.75.109.163:43034.service: Deactivated successfully. Oct 29 05:40:40.955085 systemd[1]: session-22.scope: Deactivated successfully. Oct 29 05:40:40.956774 systemd-logind[1187]: Session 22 logged out. Waiting for processes to exit. Oct 29 05:40:40.962104 systemd-logind[1187]: Removed session 22. Oct 29 05:40:43.423139 kubelet[2003]: E1029 05:40:43.422927 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-8cf699dc5-hszxg" podUID="8893c55d-6f83-44df-994b-b713e5abd120" Oct 29 05:40:46.104796 systemd[1]: Started sshd@23-10.244.11.46:22-147.75.109.163:42168.service. Oct 29 05:40:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.11.46:22-147.75.109.163:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:46.114307 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 29 05:40:46.114529 kernel: audit: type=1130 audit(1761716446.106:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.11.46:22-147.75.109.163:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:47.055000 audit[4933]: USER_ACCT pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.058206 sshd[4933]: Accepted publickey for core from 147.75.109.163 port 42168 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 05:40:47.063944 kernel: audit: type=1101 audit(1761716447.055:1519): pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.064743 sshd[4933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 05:40:47.062000 audit[4933]: CRED_ACQ pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.087942 kernel: audit: type=1103 audit(1761716447.062:1520): pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.100165 systemd-logind[1187]: New session 23 of user core. Oct 29 05:40:47.102063 systemd[1]: Started session-23.scope. Oct 29 05:40:47.062000 audit[4933]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4cc4b7c0 a2=3 a3=0 items=0 ppid=1 pid=4933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:47.113402 kernel: audit: type=1006 audit(1761716447.062:1521): pid=4933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Oct 29 05:40:47.114064 kernel: audit: type=1300 audit(1761716447.062:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4cc4b7c0 a2=3 a3=0 items=0 ppid=1 pid=4933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 05:40:47.062000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:47.120933 kernel: audit: type=1327 audit(1761716447.062:1521): proctitle=737368643A20636F7265205B707269765D Oct 29 05:40:47.115000 audit[4933]: USER_START pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.130948 kernel: audit: type=1105 audit(1761716447.115:1522): pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.120000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.140945 kernel: audit: type=1103 audit(1761716447.120:1523): pid=4935 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.427698 kubelet[2003]: E1029 05:40:47.427596 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-8n95q" podUID="e6ea8502-2cb9-417e-83f2-d0631b0ba769" Oct 29 05:40:47.894015 sshd[4933]: pam_unix(sshd:session): session closed for user core Oct 29 05:40:47.895000 audit[4933]: USER_END pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.906279 kernel: audit: type=1106 audit(1761716447.895:1524): pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.898754 systemd[1]: sshd@23-10.244.11.46:22-147.75.109.163:42168.service: Deactivated successfully. Oct 29 05:40:47.901192 systemd-logind[1187]: Session 23 logged out. Waiting for processes to exit. Oct 29 05:40:47.906077 systemd[1]: session-23.scope: Deactivated successfully. Oct 29 05:40:47.895000 audit[4933]: CRED_DISP pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.921669 kernel: audit: type=1104 audit(1761716447.895:1525): pid=4933 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 05:40:47.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.11.46:22-147.75.109.163:42168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 05:40:47.907758 systemd-logind[1187]: Removed session 23. Oct 29 05:40:50.425439 kubelet[2003]: E1029 05:40:50.425338 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-779769bb48-tjm6f" podUID="1215c1dc-2e72-4d1b-9366-b75eae9af1f6" Oct 29 05:40:50.426629 kubelet[2003]: E1029 05:40:50.426184 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-5lk8x" podUID="5092f51d-06fc-4dab-b0c4-32dc46cf7538" Oct 29 05:40:50.426814 kubelet[2003]: E1029 05:40:50.426746 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-86f7c596bf-pqnfl" podUID="285f16da-2820-4d93-85eb-6ee81d208cf9" Oct 29 05:40:51.422352 kubelet[2003]: E1029 05:40:51.422236 2003 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-nskqc" podUID="c6a0ae0a-392f-42e9-8917-4eeb8b86e85c"