Oct 31 01:17:34.874259 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:17:34.874293 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:17:34.874301 kernel: BIOS-provided physical RAM map: Oct 31 01:17:34.874307 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 31 01:17:34.874312 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 31 01:17:34.874318 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 31 01:17:34.874324 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Oct 31 01:17:34.874330 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Oct 31 01:17:34.874336 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 01:17:34.874342 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 31 01:17:34.874347 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 31 01:17:34.874352 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 31 01:17:34.874358 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Oct 31 01:17:34.874363 kernel: NX (Execute Disable) protection: active Oct 31 01:17:34.874371 kernel: SMBIOS 2.8 present. Oct 31 01:17:34.874377 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Oct 31 01:17:34.874383 kernel: Hypervisor detected: KVM Oct 31 01:17:34.874389 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 01:17:34.874395 kernel: kvm-clock: cpu 0, msr 681a0001, primary cpu clock Oct 31 01:17:34.874401 kernel: kvm-clock: using sched offset of 2839738603 cycles Oct 31 01:17:34.874407 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 01:17:34.874413 kernel: tsc: Detected 2794.748 MHz processor Oct 31 01:17:34.874419 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:17:34.874427 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:17:34.874441 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Oct 31 01:17:34.874448 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:17:34.874454 kernel: Using GB pages for direct mapping Oct 31 01:17:34.874460 kernel: ACPI: Early table checksum verification disabled Oct 31 01:17:34.874466 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Oct 31 01:17:34.874472 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874478 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874484 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874491 kernel: ACPI: FACS 0x000000009CFE0000 000040 Oct 31 01:17:34.874497 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874503 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874509 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874515 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:17:34.874521 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Oct 31 01:17:34.874527 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Oct 31 01:17:34.874533 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Oct 31 01:17:34.874543 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Oct 31 01:17:34.874550 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Oct 31 01:17:34.874556 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Oct 31 01:17:34.874563 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Oct 31 01:17:34.874569 kernel: No NUMA configuration found Oct 31 01:17:34.874575 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Oct 31 01:17:34.874583 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Oct 31 01:17:34.874589 kernel: Zone ranges: Oct 31 01:17:34.874596 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:17:34.874602 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Oct 31 01:17:34.874608 kernel: Normal empty Oct 31 01:17:34.874615 kernel: Movable zone start for each node Oct 31 01:17:34.874621 kernel: Early memory node ranges Oct 31 01:17:34.874627 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 31 01:17:34.874634 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Oct 31 01:17:34.874641 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Oct 31 01:17:34.874648 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:17:34.874654 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 31 01:17:34.874661 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Oct 31 01:17:34.874667 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 01:17:34.874674 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 01:17:34.874680 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:17:34.874686 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 01:17:34.874693 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 01:17:34.874699 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 01:17:34.874707 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 01:17:34.874713 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 01:17:34.874720 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:17:34.874726 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 31 01:17:34.874732 kernel: TSC deadline timer available Oct 31 01:17:34.874739 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 31 01:17:34.874745 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 31 01:17:34.874751 kernel: kvm-guest: setup PV sched yield Oct 31 01:17:34.874758 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 31 01:17:34.874766 kernel: Booting paravirtualized kernel on KVM Oct 31 01:17:34.874772 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:17:34.874779 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 31 01:17:34.874786 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Oct 31 01:17:34.874792 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Oct 31 01:17:34.874798 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 31 01:17:34.874804 kernel: kvm-guest: setup async PF for cpu 0 Oct 31 01:17:34.874811 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Oct 31 01:17:34.874817 kernel: kvm-guest: PV spinlocks enabled Oct 31 01:17:34.874825 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 01:17:34.874831 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Oct 31 01:17:34.874838 kernel: Policy zone: DMA32 Oct 31 01:17:34.874845 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:17:34.874852 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:17:34.874859 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 31 01:17:34.874865 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:17:34.874872 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:17:34.874880 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 134796K reserved, 0K cma-reserved) Oct 31 01:17:34.874886 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 31 01:17:34.874893 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:17:34.874899 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:17:34.874905 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:17:34.874912 kernel: rcu: RCU event tracing is enabled. Oct 31 01:17:34.874919 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 31 01:17:34.874925 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:17:34.874932 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:17:34.874940 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:17:34.874946 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 31 01:17:34.874953 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 31 01:17:34.874959 kernel: random: crng init done Oct 31 01:17:34.874966 kernel: Console: colour VGA+ 80x25 Oct 31 01:17:34.874972 kernel: printk: console [ttyS0] enabled Oct 31 01:17:34.874978 kernel: ACPI: Core revision 20210730 Oct 31 01:17:34.874985 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 31 01:17:34.874991 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:17:34.874999 kernel: x2apic enabled Oct 31 01:17:34.875005 kernel: Switched APIC routing to physical x2apic. Oct 31 01:17:34.875012 kernel: kvm-guest: setup PV IPIs Oct 31 01:17:34.875018 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:17:34.875024 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 31 01:17:34.875031 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 31 01:17:34.875038 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 01:17:34.875044 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 31 01:17:34.875051 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 31 01:17:34.875063 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:17:34.875070 kernel: Spectre V2 : Mitigation: Retpolines Oct 31 01:17:34.875077 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 31 01:17:34.875085 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 31 01:17:34.875099 kernel: active return thunk: retbleed_return_thunk Oct 31 01:17:34.875106 kernel: RETBleed: Mitigation: untrained return thunk Oct 31 01:17:34.875113 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:17:34.875120 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:17:34.875127 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:17:34.875135 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:17:34.875142 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:17:34.875149 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:17:34.875156 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 31 01:17:34.875163 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:17:34.875170 kernel: pid_max: default: 32768 minimum: 301 Oct 31 01:17:34.875177 kernel: LSM: Security Framework initializing Oct 31 01:17:34.875184 kernel: SELinux: Initializing. Oct 31 01:17:34.875191 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:17:34.875198 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:17:34.875205 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 31 01:17:34.875212 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 31 01:17:34.875219 kernel: ... version: 0 Oct 31 01:17:34.875225 kernel: ... bit width: 48 Oct 31 01:17:34.875242 kernel: ... generic registers: 6 Oct 31 01:17:34.875249 kernel: ... value mask: 0000ffffffffffff Oct 31 01:17:34.875256 kernel: ... max period: 00007fffffffffff Oct 31 01:17:34.875264 kernel: ... fixed-purpose events: 0 Oct 31 01:17:34.875271 kernel: ... event mask: 000000000000003f Oct 31 01:17:34.875277 kernel: signal: max sigframe size: 1776 Oct 31 01:17:34.875284 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:17:34.875291 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:17:34.875297 kernel: x86: Booting SMP configuration: Oct 31 01:17:34.875304 kernel: .... node #0, CPUs: #1 Oct 31 01:17:34.875311 kernel: kvm-clock: cpu 1, msr 681a0041, secondary cpu clock Oct 31 01:17:34.875318 kernel: kvm-guest: setup async PF for cpu 1 Oct 31 01:17:34.875326 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Oct 31 01:17:34.875332 kernel: #2 Oct 31 01:17:34.875339 kernel: kvm-clock: cpu 2, msr 681a0081, secondary cpu clock Oct 31 01:17:34.875346 kernel: kvm-guest: setup async PF for cpu 2 Oct 31 01:17:34.875353 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Oct 31 01:17:34.875359 kernel: #3 Oct 31 01:17:34.875366 kernel: kvm-clock: cpu 3, msr 681a00c1, secondary cpu clock Oct 31 01:17:34.875373 kernel: kvm-guest: setup async PF for cpu 3 Oct 31 01:17:34.875379 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Oct 31 01:17:34.875387 kernel: smp: Brought up 1 node, 4 CPUs Oct 31 01:17:34.875394 kernel: smpboot: Max logical packages: 1 Oct 31 01:17:34.875401 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 31 01:17:34.875408 kernel: devtmpfs: initialized Oct 31 01:17:34.875414 kernel: x86/mm: Memory block size: 128MB Oct 31 01:17:34.875421 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:17:34.875428 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 31 01:17:34.875435 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:17:34.875442 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:17:34.875459 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:17:34.875467 kernel: audit: type=2000 audit(1761873454.816:1): state=initialized audit_enabled=0 res=1 Oct 31 01:17:34.875473 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:17:34.875480 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:17:34.875487 kernel: cpuidle: using governor menu Oct 31 01:17:34.875493 kernel: ACPI: bus type PCI registered Oct 31 01:17:34.875501 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:17:34.875507 kernel: dca service started, version 1.12.1 Oct 31 01:17:34.875514 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 01:17:34.875523 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 01:17:34.875529 kernel: PCI: Using configuration type 1 for base access Oct 31 01:17:34.875536 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:17:34.875543 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:17:34.875550 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:17:34.875557 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:17:34.875563 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:17:34.875570 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:17:34.875577 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:17:34.875589 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:17:34.875603 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:17:34.875611 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:17:34.875618 kernel: ACPI: Interpreter enabled Oct 31 01:17:34.875624 kernel: ACPI: PM: (supports S0 S3 S5) Oct 31 01:17:34.875631 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:17:34.875638 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:17:34.875645 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 01:17:34.875652 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 01:17:34.878493 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:17:34.878573 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Oct 31 01:17:34.878639 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Oct 31 01:17:34.878649 kernel: PCI host bridge to bus 0000:00 Oct 31 01:17:34.878723 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:17:34.878785 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 01:17:34.878849 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:17:34.878910 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Oct 31 01:17:34.878969 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:17:34.879028 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Oct 31 01:17:34.879088 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 01:17:34.879182 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 01:17:34.879278 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Oct 31 01:17:34.879350 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Oct 31 01:17:34.879418 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Oct 31 01:17:34.879484 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Oct 31 01:17:34.879550 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:17:34.879627 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Oct 31 01:17:34.879697 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 31 01:17:34.879767 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Oct 31 01:17:34.879837 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Oct 31 01:17:34.879912 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Oct 31 01:17:34.879980 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Oct 31 01:17:34.880047 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Oct 31 01:17:34.880124 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Oct 31 01:17:34.880200 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 31 01:17:34.880282 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Oct 31 01:17:34.880355 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Oct 31 01:17:34.880423 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Oct 31 01:17:34.880489 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Oct 31 01:17:34.880591 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 01:17:34.880663 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 01:17:34.880736 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 01:17:34.880807 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Oct 31 01:17:34.880873 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Oct 31 01:17:34.880946 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 01:17:34.881013 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 31 01:17:34.881022 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 01:17:34.881030 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 01:17:34.881037 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:17:34.881044 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 01:17:34.881053 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 01:17:34.881060 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 01:17:34.881067 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 01:17:34.881074 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 01:17:34.881080 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 01:17:34.881087 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 01:17:34.881103 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 01:17:34.881110 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 01:17:34.881117 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 01:17:34.881126 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 01:17:34.881133 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 01:17:34.881140 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 01:17:34.881147 kernel: iommu: Default domain type: Translated Oct 31 01:17:34.881153 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:17:34.881224 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 01:17:34.881315 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:17:34.881382 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 01:17:34.881394 kernel: vgaarb: loaded Oct 31 01:17:34.881401 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:17:34.881408 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:17:34.881415 kernel: PTP clock support registered Oct 31 01:17:34.881421 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:17:34.881428 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:17:34.881435 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 31 01:17:34.881441 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Oct 31 01:17:34.881448 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 31 01:17:34.881456 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 31 01:17:34.881463 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 01:17:34.881470 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:17:34.881477 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:17:34.881483 kernel: pnp: PnP ACPI init Oct 31 01:17:34.881561 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 01:17:34.881571 kernel: pnp: PnP ACPI: found 6 devices Oct 31 01:17:34.881578 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:17:34.881587 kernel: NET: Registered PF_INET protocol family Oct 31 01:17:34.881594 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 31 01:17:34.881601 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 31 01:17:34.881608 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:17:34.881615 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:17:34.881622 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 31 01:17:34.881629 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 31 01:17:34.881635 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:17:34.881642 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:17:34.881650 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:17:34.881657 kernel: NET: Registered PF_XDP protocol family Oct 31 01:17:34.881720 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 01:17:34.881781 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 01:17:34.881841 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 01:17:34.881901 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Oct 31 01:17:34.884629 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 01:17:34.884736 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Oct 31 01:17:34.884747 kernel: PCI: CLS 0 bytes, default 64 Oct 31 01:17:34.884760 kernel: Initialise system trusted keyrings Oct 31 01:17:34.884769 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 31 01:17:34.884776 kernel: Key type asymmetric registered Oct 31 01:17:34.884783 kernel: Asymmetric key parser 'x509' registered Oct 31 01:17:34.884790 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:17:34.884797 kernel: io scheduler mq-deadline registered Oct 31 01:17:34.884805 kernel: io scheduler kyber registered Oct 31 01:17:34.884812 kernel: io scheduler bfq registered Oct 31 01:17:34.884819 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:17:34.884828 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 01:17:34.884835 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 01:17:34.884842 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 01:17:34.884849 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:17:34.884856 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:17:34.884864 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 01:17:34.884871 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:17:34.884879 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:17:34.884957 kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 31 01:17:34.884970 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:17:34.885050 kernel: rtc_cmos 00:04: registered as rtc0 Oct 31 01:17:34.885126 kernel: rtc_cmos 00:04: setting system clock to 2025-10-31T01:17:34 UTC (1761873454) Oct 31 01:17:34.885190 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 31 01:17:34.885200 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:17:34.885207 kernel: Segment Routing with IPv6 Oct 31 01:17:34.885214 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:17:34.885221 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:17:34.885257 kernel: Key type dns_resolver registered Oct 31 01:17:34.885265 kernel: IPI shorthand broadcast: enabled Oct 31 01:17:34.885273 kernel: sched_clock: Marking stable (611255248, 188488406)->(837835851, -38092197) Oct 31 01:17:34.885280 kernel: registered taskstats version 1 Oct 31 01:17:34.885287 kernel: Loading compiled-in X.509 certificates Oct 31 01:17:34.885295 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:17:34.885302 kernel: Key type .fscrypt registered Oct 31 01:17:34.885309 kernel: Key type fscrypt-provisioning registered Oct 31 01:17:34.885316 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:17:34.885325 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:17:34.885332 kernel: ima: No architecture policies found Oct 31 01:17:34.885340 kernel: clk: Disabling unused clocks Oct 31 01:17:34.885347 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:17:34.885354 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:17:34.885361 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:17:34.885368 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:17:34.885376 kernel: Run /init as init process Oct 31 01:17:34.885384 kernel: with arguments: Oct 31 01:17:34.885392 kernel: /init Oct 31 01:17:34.885399 kernel: with environment: Oct 31 01:17:34.885407 kernel: HOME=/ Oct 31 01:17:34.885413 kernel: TERM=linux Oct 31 01:17:34.885420 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:17:34.885431 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:17:34.885442 systemd[1]: Detected virtualization kvm. Oct 31 01:17:34.885451 systemd[1]: Detected architecture x86-64. Oct 31 01:17:34.885458 systemd[1]: Running in initrd. Oct 31 01:17:34.885466 systemd[1]: No hostname configured, using default hostname. Oct 31 01:17:34.885473 systemd[1]: Hostname set to . Oct 31 01:17:34.885481 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:17:34.885488 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:17:34.885496 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:17:34.885504 systemd[1]: Reached target cryptsetup.target. Oct 31 01:17:34.885511 systemd[1]: Reached target paths.target. Oct 31 01:17:34.885520 systemd[1]: Reached target slices.target. Oct 31 01:17:34.885535 systemd[1]: Reached target swap.target. Oct 31 01:17:34.885544 systemd[1]: Reached target timers.target. Oct 31 01:17:34.885552 systemd[1]: Listening on iscsid.socket. Oct 31 01:17:34.885560 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:17:34.885570 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:17:34.885578 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:17:34.885586 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:17:34.885593 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:17:34.885601 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:17:34.885608 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:17:34.885616 systemd[1]: Reached target sockets.target. Oct 31 01:17:34.885624 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:17:34.885632 systemd[1]: Finished network-cleanup.service. Oct 31 01:17:34.885641 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:17:34.885649 systemd[1]: Starting systemd-journald.service... Oct 31 01:17:34.885657 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:17:34.885665 systemd[1]: Starting systemd-resolved.service... Oct 31 01:17:34.885672 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:17:34.885680 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:17:34.885688 kernel: audit: type=1130 audit(1761873454.875:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.885696 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:17:34.885705 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:17:34.885713 kernel: audit: type=1130 audit(1761873454.883:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.885725 systemd-journald[198]: Journal started Oct 31 01:17:34.885771 systemd-journald[198]: Runtime Journal (/run/log/journal/5f58c717289141dfa69057b3f2b18685) is 6.0M, max 48.5M, 42.5M free. Oct 31 01:17:34.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.875628 systemd-modules-load[199]: Inserted module 'overlay' Oct 31 01:17:34.976120 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:17:34.976136 kernel: Bridge firewalling registered Oct 31 01:17:34.976147 kernel: SCSI subsystem initialized Oct 31 01:17:34.976156 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:17:34.976168 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:17:34.976178 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:17:34.976186 systemd[1]: Started systemd-journald.service. Oct 31 01:17:34.976197 kernel: audit: type=1130 audit(1761873454.975:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.902842 systemd-resolved[200]: Positive Trust Anchors: Oct 31 01:17:35.012474 kernel: audit: type=1130 audit(1761873454.981:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.012488 kernel: audit: type=1130 audit(1761873454.987:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.012499 kernel: audit: type=1130 audit(1761873454.993:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.012510 kernel: audit: type=1130 audit(1761873454.998:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.902851 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:17:34.902876 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:17:35.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.904954 systemd-resolved[200]: Defaulting to hostname 'linux'. Oct 31 01:17:35.032953 kernel: audit: type=1130 audit(1761873455.025:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.915214 systemd-modules-load[199]: Inserted module 'br_netfilter' Oct 31 01:17:35.040453 kernel: audit: type=1130 audit(1761873455.032:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:34.942906 systemd-modules-load[199]: Inserted module 'dm_multipath' Oct 31 01:17:34.976199 systemd[1]: Started systemd-resolved.service. Oct 31 01:17:34.981780 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:17:35.045035 dracut-cmdline[220]: dracut-dracut-053 Oct 31 01:17:35.045035 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 31 01:17:35.045035 dracut-cmdline[220]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:17:34.987517 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:17:34.993577 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:17:34.999289 systemd[1]: Reached target nss-lookup.target. Oct 31 01:17:35.005397 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:17:35.005895 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:17:35.016023 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:17:35.025538 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:17:35.033658 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:17:35.093255 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:17:35.110256 kernel: iscsi: registered transport (tcp) Oct 31 01:17:35.131262 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:17:35.131291 kernel: QLogic iSCSI HBA Driver Oct 31 01:17:35.152838 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:17:35.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.154523 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:17:35.200256 kernel: raid6: avx2x4 gen() 30704 MB/s Oct 31 01:17:35.218252 kernel: raid6: avx2x4 xor() 8382 MB/s Oct 31 01:17:35.236250 kernel: raid6: avx2x2 gen() 32143 MB/s Oct 31 01:17:35.254250 kernel: raid6: avx2x2 xor() 19255 MB/s Oct 31 01:17:35.272258 kernel: raid6: avx2x1 gen() 26485 MB/s Oct 31 01:17:35.290255 kernel: raid6: avx2x1 xor() 15339 MB/s Oct 31 01:17:35.308253 kernel: raid6: sse2x4 gen() 14755 MB/s Oct 31 01:17:35.326265 kernel: raid6: sse2x4 xor() 7442 MB/s Oct 31 01:17:35.344252 kernel: raid6: sse2x2 gen() 16384 MB/s Oct 31 01:17:35.362252 kernel: raid6: sse2x2 xor() 9837 MB/s Oct 31 01:17:35.380257 kernel: raid6: sse2x1 gen() 12370 MB/s Oct 31 01:17:35.398696 kernel: raid6: sse2x1 xor() 7781 MB/s Oct 31 01:17:35.398722 kernel: raid6: using algorithm avx2x2 gen() 32143 MB/s Oct 31 01:17:35.398732 kernel: raid6: .... xor() 19255 MB/s, rmw enabled Oct 31 01:17:35.399952 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:17:35.413259 kernel: xor: automatically using best checksumming function avx Oct 31 01:17:35.503277 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:17:35.510428 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:17:35.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.512000 audit: BPF prog-id=7 op=LOAD Oct 31 01:17:35.512000 audit: BPF prog-id=8 op=LOAD Oct 31 01:17:35.513304 systemd[1]: Starting systemd-udevd.service... Oct 31 01:17:35.526534 systemd-udevd[400]: Using default interface naming scheme 'v252'. Oct 31 01:17:35.531743 systemd[1]: Started systemd-udevd.service. Oct 31 01:17:35.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.533276 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:17:35.542646 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Oct 31 01:17:35.566816 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:17:35.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.568318 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:17:35.597905 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:17:35.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:35.631343 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Oct 31 01:17:35.640220 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 01:17:35.640245 kernel: GPT:9289727 != 19775487 Oct 31 01:17:35.640254 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 01:17:35.640263 kernel: GPT:9289727 != 19775487 Oct 31 01:17:35.640271 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 01:17:35.640283 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:17:35.645250 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:17:35.648263 kernel: libata version 3.00 loaded. Oct 31 01:17:35.656269 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 01:17:35.679524 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 01:17:35.679538 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 01:17:35.679632 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 01:17:35.679710 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:17:35.679724 kernel: AES CTR mode by8 optimization enabled Oct 31 01:17:35.679733 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (452) Oct 31 01:17:35.679742 kernel: scsi host0: ahci Oct 31 01:17:35.679834 kernel: scsi host1: ahci Oct 31 01:17:35.679921 kernel: scsi host2: ahci Oct 31 01:17:35.680002 kernel: scsi host3: ahci Oct 31 01:17:35.680093 kernel: scsi host4: ahci Oct 31 01:17:35.680176 kernel: scsi host5: ahci Oct 31 01:17:35.680271 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Oct 31 01:17:35.680280 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Oct 31 01:17:35.680289 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Oct 31 01:17:35.680298 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Oct 31 01:17:35.680306 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Oct 31 01:17:35.680315 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Oct 31 01:17:35.667428 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:17:35.751566 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:17:35.761917 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:17:35.765321 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:17:35.769505 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:17:35.770720 systemd[1]: Starting disk-uuid.service... Oct 31 01:17:35.782135 disk-uuid[524]: Primary Header is updated. Oct 31 01:17:35.782135 disk-uuid[524]: Secondary Entries is updated. Oct 31 01:17:35.782135 disk-uuid[524]: Secondary Header is updated. Oct 31 01:17:35.788143 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:17:35.993134 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 01:17:35.993191 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 01:17:35.993201 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 01:17:35.995280 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Oct 31 01:17:35.997260 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 01:17:35.997278 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 01:17:35.999262 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 31 01:17:36.001182 kernel: ata3.00: applying bridge limits Oct 31 01:17:36.003270 kernel: ata3.00: configured for UDMA/100 Oct 31 01:17:36.003340 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 31 01:17:36.038593 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 31 01:17:36.055791 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:17:36.055804 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:17:36.795015 disk-uuid[525]: The operation has completed successfully. Oct 31 01:17:36.797303 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:17:36.813706 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:17:36.813789 systemd[1]: Finished disk-uuid.service. Oct 31 01:17:36.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:36.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:36.823972 systemd[1]: Starting verity-setup.service... Oct 31 01:17:36.836255 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Oct 31 01:17:36.854881 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:17:36.858577 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:17:36.860646 systemd[1]: Finished verity-setup.service. Oct 31 01:17:36.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:36.921207 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:17:36.923514 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:17:36.922017 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 01:17:36.923509 systemd[1]: Starting ignition-setup.service... Oct 31 01:17:36.924632 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:17:36.940263 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:17:36.940318 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:17:36.940328 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:17:36.948698 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:17:36.956745 systemd[1]: Finished ignition-setup.service. Oct 31 01:17:36.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:36.960025 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:17:36.994188 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:17:36.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:36.995965 ignition[664]: Ignition 2.14.0 Oct 31 01:17:36.995972 ignition[664]: Stage: fetch-offline Oct 31 01:17:36.996014 ignition[664]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:36.996021 ignition[664]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:36.996123 ignition[664]: parsed url from cmdline: "" Oct 31 01:17:36.996126 ignition[664]: no config URL provided Oct 31 01:17:36.996130 ignition[664]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:17:36.996136 ignition[664]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:17:36.996152 ignition[664]: op(1): [started] loading QEMU firmware config module Oct 31 01:17:36.996157 ignition[664]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 31 01:17:36.999636 ignition[664]: op(1): [finished] loading QEMU firmware config module Oct 31 01:17:37.010000 audit: BPF prog-id=9 op=LOAD Oct 31 01:17:37.012658 systemd[1]: Starting systemd-networkd.service... Oct 31 01:17:37.090149 ignition[664]: parsing config with SHA512: 11eafc08fa7fdeff22e89b80c9a250a350ac945211cdb57500248ec17c26f6919cead8165bc6675b0845e18237dcc873cb2385b27b73fc4dda3c0d365a89f1a4 Oct 31 01:17:37.096989 unknown[664]: fetched base config from "system" Oct 31 01:17:37.097002 unknown[664]: fetched user config from "qemu" Oct 31 01:17:37.097411 ignition[664]: fetch-offline: fetch-offline passed Oct 31 01:17:37.097458 ignition[664]: Ignition finished successfully Oct 31 01:17:37.102732 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:17:37.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.108069 systemd-networkd[721]: lo: Link UP Oct 31 01:17:37.108078 systemd-networkd[721]: lo: Gained carrier Oct 31 01:17:37.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.108465 systemd-networkd[721]: Enumeration completed Oct 31 01:17:37.108524 systemd[1]: Started systemd-networkd.service. Oct 31 01:17:37.108648 systemd-networkd[721]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:17:37.109521 systemd-networkd[721]: eth0: Link UP Oct 31 01:17:37.109524 systemd-networkd[721]: eth0: Gained carrier Oct 31 01:17:37.110783 systemd[1]: Reached target network.target. Oct 31 01:17:37.113198 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:17:37.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.113929 systemd[1]: Starting ignition-kargs.service... Oct 31 01:17:37.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.130178 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:17:37.130178 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 31 01:17:37.130178 iscsid[727]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:17:37.130178 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:17:37.130178 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:17:37.130178 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:17:37.130178 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:17:37.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.117412 systemd[1]: Starting iscsiuio.service... Oct 31 01:17:37.130144 ignition[723]: Ignition 2.14.0 Oct 31 01:17:37.122503 systemd[1]: Started iscsiuio.service. Oct 31 01:17:37.130150 ignition[723]: Stage: kargs Oct 31 01:17:37.123741 systemd[1]: Starting iscsid.service... Oct 31 01:17:37.130262 ignition[723]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:37.127957 systemd[1]: Started iscsid.service. Oct 31 01:17:37.130271 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:37.129492 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:17:37.131115 ignition[723]: kargs: kargs passed Oct 31 01:17:37.133480 systemd[1]: Finished ignition-kargs.service. Oct 31 01:17:37.131143 ignition[723]: Ignition finished successfully Oct 31 01:17:37.134311 systemd-networkd[721]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:17:37.146074 ignition[735]: Ignition 2.14.0 Oct 31 01:17:37.140477 systemd[1]: Starting ignition-disks.service... Oct 31 01:17:37.146078 ignition[735]: Stage: disks Oct 31 01:17:37.147517 systemd[1]: Finished ignition-disks.service. Oct 31 01:17:37.146147 ignition[735]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:37.148817 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:17:37.146154 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:37.151793 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:17:37.146968 ignition[735]: disks: disks passed Oct 31 01:17:37.155161 systemd[1]: Reached target local-fs.target. Oct 31 01:17:37.146996 ignition[735]: Ignition finished successfully Oct 31 01:17:37.157775 systemd[1]: Reached target sysinit.target. Oct 31 01:17:37.159623 systemd[1]: Reached target basic.target. Oct 31 01:17:37.197879 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:17:37.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.200459 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:17:37.201065 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:17:37.203552 systemd[1]: Reached target remote-fs.target. Oct 31 01:17:37.207950 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:17:37.216883 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:17:37.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.219379 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:17:37.230765 systemd-fsck[756]: ROOT: clean, 637/553520 files, 56032/553472 blocks Oct 31 01:17:37.352958 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:17:37.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.354630 systemd[1]: Mounting sysroot.mount... Oct 31 01:17:37.366251 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:17:37.366324 systemd[1]: Mounted sysroot.mount. Oct 31 01:17:37.367016 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:17:37.369849 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:17:37.371826 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:17:37.371857 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:17:37.371877 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:17:37.374324 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:17:37.384663 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:17:37.377962 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:17:37.387956 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:17:37.389823 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:17:37.391698 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:17:37.414525 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:17:37.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.417854 systemd[1]: Starting ignition-mount.service... Oct 31 01:17:37.420796 systemd[1]: Starting sysroot-boot.service... Oct 31 01:17:37.424051 bash[807]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 01:17:37.430759 ignition[808]: INFO : Ignition 2.14.0 Oct 31 01:17:37.430759 ignition[808]: INFO : Stage: mount Oct 31 01:17:37.434748 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:37.434748 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:37.434748 ignition[808]: INFO : mount: mount passed Oct 31 01:17:37.434748 ignition[808]: INFO : Ignition finished successfully Oct 31 01:17:37.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:37.432756 systemd[1]: Finished ignition-mount.service. Oct 31 01:17:37.437415 systemd[1]: Finished sysroot-boot.service. Oct 31 01:17:37.870698 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:17:37.878885 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (818) Oct 31 01:17:37.878908 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:17:37.878921 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:17:37.880270 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:17:37.884655 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:17:37.888053 systemd[1]: Starting ignition-files.service... Oct 31 01:17:37.900048 ignition[838]: INFO : Ignition 2.14.0 Oct 31 01:17:37.900048 ignition[838]: INFO : Stage: files Oct 31 01:17:37.902921 ignition[838]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:37.902921 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:37.902921 ignition[838]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:17:37.902921 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:17:37.902921 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:17:37.913363 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:17:37.913363 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:17:37.913363 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:17:37.913363 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 31 01:17:37.913363 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Oct 31 01:17:37.903781 unknown[838]: wrote ssh authorized keys file for user: core Oct 31 01:17:37.955951 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 31 01:17:38.010247 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:17:38.013652 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 31 01:17:38.457723 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 01:17:38.787080 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:17:38.787080 ignition[838]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:17:38.794146 ignition[838]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:17:38.828442 ignition[838]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:17:38.831006 ignition[838]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:17:38.833484 ignition[838]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:17:38.836344 ignition[838]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:17:38.836344 ignition[838]: INFO : files: files passed Oct 31 01:17:38.840312 ignition[838]: INFO : Ignition finished successfully Oct 31 01:17:38.842632 systemd[1]: Finished ignition-files.service. Oct 31 01:17:38.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.844316 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:17:38.845930 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:17:38.846481 systemd[1]: Starting ignition-quench.service... Oct 31 01:17:38.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.849204 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:17:38.849309 systemd[1]: Finished ignition-quench.service. Oct 31 01:17:38.859292 initrd-setup-root-after-ignition[863]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 31 01:17:38.862944 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:17:38.863523 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:17:38.867094 systemd[1]: Reached target ignition-complete.target. Oct 31 01:17:38.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.868549 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:17:38.879179 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:17:38.879269 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:17:38.882062 systemd[1]: Reached target initrd-fs.target. Oct 31 01:17:38.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.882861 systemd[1]: Reached target initrd.target. Oct 31 01:17:38.886083 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:17:38.886735 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:17:38.897444 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:17:38.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.898723 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:17:38.905929 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:17:38.906662 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:17:38.909776 systemd[1]: Stopped target timers.target. Oct 31 01:17:38.910653 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:17:38.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.910765 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:17:38.914052 systemd[1]: Stopped target initrd.target. Oct 31 01:17:38.916783 systemd[1]: Stopped target basic.target. Oct 31 01:17:38.919724 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:17:38.922335 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:17:38.924837 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:17:38.927635 systemd[1]: Stopped target remote-fs.target. Oct 31 01:17:38.930257 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:17:38.932870 systemd[1]: Stopped target sysinit.target. Oct 31 01:17:38.935318 systemd[1]: Stopped target local-fs.target. Oct 31 01:17:38.937887 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:17:38.940400 systemd[1]: Stopped target swap.target. Oct 31 01:17:38.942745 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:17:38.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.942830 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:17:38.945333 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:17:38.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.947572 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:17:38.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.947662 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:17:38.950480 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:17:38.950570 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:17:38.953088 systemd[1]: Stopped target paths.target. Oct 31 01:17:38.953894 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:17:38.957304 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:17:38.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.959737 systemd[1]: Stopped target slices.target. Oct 31 01:17:38.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.962579 systemd[1]: Stopped target sockets.target. Oct 31 01:17:38.965098 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:17:38.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.979924 ignition[878]: INFO : Ignition 2.14.0 Oct 31 01:17:38.979924 ignition[878]: INFO : Stage: umount Oct 31 01:17:38.979924 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:17:38.979924 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:17:38.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.965170 systemd[1]: Closed iscsid.socket. Oct 31 01:17:38.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.994326 ignition[878]: INFO : umount: umount passed Oct 31 01:17:38.994326 ignition[878]: INFO : Ignition finished successfully Oct 31 01:17:38.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:38.966052 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:17:38.966144 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:17:38.969947 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:17:38.970038 systemd[1]: Stopped ignition-files.service. Oct 31 01:17:38.973431 systemd[1]: Stopping ignition-mount.service... Oct 31 01:17:38.974900 systemd[1]: Stopping iscsiuio.service... Oct 31 01:17:38.977253 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:17:38.977426 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:17:38.980045 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:17:38.980744 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:17:38.980860 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:17:38.983742 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:17:38.983832 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:17:38.985938 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:17:38.986028 systemd[1]: Stopped ignition-mount.service. Oct 31 01:17:38.987122 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:17:38.987201 systemd[1]: Stopped ignition-disks.service. Oct 31 01:17:38.989888 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:17:38.989925 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:17:38.993688 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:17:38.993721 systemd[1]: Stopped ignition-setup.service. Oct 31 01:17:38.995606 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:17:38.996019 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:17:38.996090 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:17:39.022438 systemd-networkd[721]: eth0: Gained IPv6LL Oct 31 01:17:39.037407 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:17:39.037510 systemd[1]: Stopped iscsiuio.service. Oct 31 01:17:39.040134 systemd[1]: Stopped target network.target. Oct 31 01:17:39.040941 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:17:39.051612 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 31 01:17:39.051636 kernel: audit: type=1131 audit(1761873459.039:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.040978 systemd[1]: Closed iscsiuio.socket. Oct 31 01:17:39.051057 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:17:39.051915 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:17:39.057307 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:17:39.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.057398 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:17:39.073509 kernel: audit: type=1131 audit(1761873459.059:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.073533 kernel: audit: type=1131 audit(1761873459.067:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.059693 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:17:39.059728 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:17:39.076924 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:17:39.077029 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:17:39.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.086283 kernel: audit: type=1131 audit(1761873459.079:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.088276 systemd-networkd[721]: eth0: DHCPv6 lease lost Oct 31 01:17:39.089920 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:17:39.094766 kernel: audit: type=1334 audit(1761873459.090:62): prog-id=6 op=UNLOAD Oct 31 01:17:39.094786 kernel: audit: type=1131 audit(1761873459.094:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.090000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:17:39.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.090020 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:17:39.096381 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:17:39.107162 kernel: audit: type=1334 audit(1761873459.102:64): prog-id=9 op=UNLOAD Oct 31 01:17:39.102000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:17:39.096409 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:17:39.116260 kernel: audit: type=1131 audit(1761873459.108:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.116281 kernel: audit: type=1131 audit(1761873459.115:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.105010 systemd[1]: Stopping network-cleanup.service... Oct 31 01:17:39.123792 kernel: audit: type=1131 audit(1761873459.123:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.107147 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:17:39.107186 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:17:39.108709 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:17:39.108742 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:17:39.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.121146 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:17:39.121177 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:17:39.123858 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:17:39.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.131911 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:17:39.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.134904 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:17:39.135033 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:17:39.139530 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:17:39.139612 systemd[1]: Stopped network-cleanup.service. Oct 31 01:17:39.142409 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:17:39.142440 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:17:39.145067 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:17:39.145094 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:17:39.145755 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:17:39.145787 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:17:39.146079 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:17:39.146104 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:17:39.146665 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:17:39.146690 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:17:39.147528 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:17:39.147576 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:17:39.147616 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:17:39.152685 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:17:39.190484 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). Oct 31 01:17:39.190516 iscsid[727]: iscsid shutting down. Oct 31 01:17:39.152756 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:17:39.153489 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:17:39.154267 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:17:39.169976 systemd[1]: Switching root. Oct 31 01:17:39.196452 systemd-journald[198]: Journal stopped Oct 31 01:17:41.937039 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:17:41.937085 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:17:41.937096 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:17:41.937106 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:17:41.937120 kernel: SELinux: policy capability open_perms=1 Oct 31 01:17:41.937129 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:17:41.937143 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:17:41.937155 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:17:41.937164 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:17:41.937173 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:17:41.937182 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:17:41.937193 systemd[1]: Successfully loaded SELinux policy in 48.578ms. Oct 31 01:17:41.937216 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.254ms. Oct 31 01:17:41.937239 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:17:41.937250 systemd[1]: Detected virtualization kvm. Oct 31 01:17:41.937260 systemd[1]: Detected architecture x86-64. Oct 31 01:17:41.937272 systemd[1]: Detected first boot. Oct 31 01:17:41.937282 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:17:41.937293 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:17:41.937304 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:17:41.937314 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:17:41.937325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:17:41.937336 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:17:41.937350 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:17:41.937360 systemd[1]: Stopped iscsid.service. Oct 31 01:17:41.937371 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:17:41.937382 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:17:41.937392 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:17:41.937403 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:17:41.937413 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:17:41.937424 systemd[1]: Created slice system-getty.slice. Oct 31 01:17:41.937433 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:17:41.937443 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:17:41.937454 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:17:41.937464 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:17:41.937477 systemd[1]: Created slice user.slice. Oct 31 01:17:41.937488 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:17:41.937502 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:17:41.937514 systemd[1]: Set up automount boot.automount. Oct 31 01:17:41.937524 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:17:41.937534 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:17:41.937545 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:17:41.937555 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:17:41.937564 systemd[1]: Reached target integritysetup.target. Oct 31 01:17:41.937574 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:17:41.937586 systemd[1]: Reached target remote-fs.target. Oct 31 01:17:41.937596 systemd[1]: Reached target slices.target. Oct 31 01:17:41.937606 systemd[1]: Reached target swap.target. Oct 31 01:17:41.937616 systemd[1]: Reached target torcx.target. Oct 31 01:17:41.937626 systemd[1]: Reached target veritysetup.target. Oct 31 01:17:41.937635 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:17:41.937645 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:17:41.937655 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:17:41.937665 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:17:41.937676 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:17:41.937688 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:17:41.937698 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:17:41.937708 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:17:41.937718 systemd[1]: Mounting media.mount... Oct 31 01:17:41.937729 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:41.937738 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:17:41.937748 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:17:41.937758 systemd[1]: Mounting tmp.mount... Oct 31 01:17:41.937769 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:17:41.937780 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:17:41.937790 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:17:41.937800 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:17:41.937810 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:17:41.937821 systemd[1]: Starting modprobe@drm.service... Oct 31 01:17:41.937831 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:17:41.937841 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:17:41.937851 systemd[1]: Starting modprobe@loop.service... Oct 31 01:17:41.937861 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:17:41.937872 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:17:41.937882 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:17:41.937901 kernel: fuse: init (API version 7.34) Oct 31 01:17:41.937911 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:17:41.937921 kernel: loop: module loaded Oct 31 01:17:41.937931 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:17:41.937941 systemd[1]: Stopped systemd-journald.service. Oct 31 01:17:41.937951 systemd[1]: Starting systemd-journald.service... Oct 31 01:17:41.937961 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:17:41.937973 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:17:41.939126 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:17:41.939146 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:17:41.939157 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:17:41.939167 systemd[1]: Stopped verity-setup.service. Oct 31 01:17:41.939178 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:41.939190 systemd-journald[1000]: Journal started Oct 31 01:17:41.939226 systemd-journald[1000]: Runtime Journal (/run/log/journal/5f58c717289141dfa69057b3f2b18685) is 6.0M, max 48.5M, 42.5M free. Oct 31 01:17:39.256000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:17:39.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:17:39.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:17:39.669000 audit: BPF prog-id=10 op=LOAD Oct 31 01:17:39.669000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:17:39.669000 audit: BPF prog-id=11 op=LOAD Oct 31 01:17:39.669000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:17:39.700000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:17:39.700000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:39.700000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:17:39.702000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:17:39.702000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155979 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:39.702000 audit: CWD cwd="/" Oct 31 01:17:39.702000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:39.702000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:39.702000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:17:41.751000 audit: BPF prog-id=12 op=LOAD Oct 31 01:17:41.751000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:17:41.751000 audit: BPF prog-id=13 op=LOAD Oct 31 01:17:41.751000 audit: BPF prog-id=14 op=LOAD Oct 31 01:17:41.751000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:17:41.751000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:17:41.752000 audit: BPF prog-id=15 op=LOAD Oct 31 01:17:41.753000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:17:41.753000 audit: BPF prog-id=16 op=LOAD Oct 31 01:17:41.753000 audit: BPF prog-id=17 op=LOAD Oct 31 01:17:41.753000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:17:41.753000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:17:41.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.771000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:17:41.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.916000 audit: BPF prog-id=18 op=LOAD Oct 31 01:17:41.916000 audit: BPF prog-id=19 op=LOAD Oct 31 01:17:41.916000 audit: BPF prog-id=20 op=LOAD Oct 31 01:17:41.916000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:17:41.916000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:17:41.934000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:17:41.934000 audit[1000]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdc6bb4040 a2=4000 a3=7ffdc6bb40dc items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:41.934000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:17:41.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:39.698762 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:17:41.750590 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:17:39.698998 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:17:41.750601 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 01:17:39.699014 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:17:41.753703 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:17:39.699042 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:17:39.699054 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:17:39.699084 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:17:39.699099 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:17:39.699310 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:17:39.699351 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:17:39.699365 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:17:39.700025 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:17:39.700064 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:17:39.700085 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:17:39.700099 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:17:39.700116 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:17:39.700129 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:17:41.495409 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:17:41.495680 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:17:41.495776 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:17:41.495937 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:17:41.495982 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:17:41.496035 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-10-31T01:17:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:17:41.946061 systemd[1]: Started systemd-journald.service. Oct 31 01:17:41.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.946468 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:17:41.947689 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:17:41.948863 systemd[1]: Mounted media.mount. Oct 31 01:17:41.949963 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:17:41.951281 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:17:41.952597 systemd[1]: Mounted tmp.mount. Oct 31 01:17:41.953800 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:17:41.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.955297 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:17:41.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.956764 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:17:41.956896 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:17:41.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.958369 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:17:41.958488 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:17:41.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.959922 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:17:41.960022 systemd[1]: Finished modprobe@drm.service. Oct 31 01:17:41.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.961429 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:17:41.961545 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:17:41.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.963039 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:17:41.963150 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:17:41.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.964546 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:17:41.964681 systemd[1]: Finished modprobe@loop.service. Oct 31 01:17:41.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.966111 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:17:41.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.967626 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:17:41.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.969270 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:17:41.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.970931 systemd[1]: Reached target network-pre.target. Oct 31 01:17:41.973192 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:17:41.975209 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:17:41.976469 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:17:41.977619 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:17:41.979616 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:17:41.981008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:17:41.981717 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:17:41.983029 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:17:41.983694 systemd-journald[1000]: Time spent on flushing to /var/log/journal/5f58c717289141dfa69057b3f2b18685 is 12.939ms for 1096 entries. Oct 31 01:17:41.983694 systemd-journald[1000]: System Journal (/var/log/journal/5f58c717289141dfa69057b3f2b18685) is 8.0M, max 195.6M, 187.6M free. Oct 31 01:17:42.063958 systemd-journald[1000]: Received client request to flush runtime journal. Oct 31 01:17:41.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.984060 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:17:41.987824 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:17:41.990669 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:17:42.064589 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 31 01:17:42.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:41.992142 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:17:41.993541 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:17:41.995830 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:17:42.044965 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:17:42.046435 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:17:42.052090 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:17:42.053926 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:17:42.064642 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:17:42.481707 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:17:42.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.483000 audit: BPF prog-id=21 op=LOAD Oct 31 01:17:42.483000 audit: BPF prog-id=22 op=LOAD Oct 31 01:17:42.483000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:17:42.483000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:17:42.484462 systemd[1]: Starting systemd-udevd.service... Oct 31 01:17:42.499637 systemd-udevd[1017]: Using default interface naming scheme 'v252'. Oct 31 01:17:42.511527 systemd[1]: Started systemd-udevd.service. Oct 31 01:17:42.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.513000 audit: BPF prog-id=23 op=LOAD Oct 31 01:17:42.514498 systemd[1]: Starting systemd-networkd.service... Oct 31 01:17:42.518516 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:17:42.517000 audit: BPF prog-id=24 op=LOAD Oct 31 01:17:42.517000 audit: BPF prog-id=25 op=LOAD Oct 31 01:17:42.517000 audit: BPF prog-id=26 op=LOAD Oct 31 01:17:42.536891 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:17:42.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.547268 systemd[1]: Started systemd-userdbd.service. Oct 31 01:17:42.559813 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:17:42.580000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:17:42.580000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557cc3b94180 a1=338ec a2=7f445ebe6bc5 a3=5 items=110 ppid=1017 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:42.580000 audit: CWD cwd="/" Oct 31 01:17:42.580000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=1 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=2 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=3 name=(null) inode=14097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=4 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=5 name=(null) inode=14098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=6 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=7 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=8 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=9 name=(null) inode=14100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=10 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=11 name=(null) inode=14101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=12 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=13 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=14 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=15 name=(null) inode=14103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=16 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=17 name=(null) inode=14104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=18 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=19 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=20 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=21 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=22 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=23 name=(null) inode=14107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=24 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=25 name=(null) inode=14108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=26 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=27 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=28 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=29 name=(null) inode=14110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=30 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=31 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=32 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=33 name=(null) inode=14112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=34 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=35 name=(null) inode=14113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=36 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=37 name=(null) inode=14114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=38 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=39 name=(null) inode=14115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=40 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=41 name=(null) inode=14116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=42 name=(null) inode=14096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=43 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=44 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=45 name=(null) inode=14118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=46 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=47 name=(null) inode=14119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=48 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=49 name=(null) inode=14120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=50 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=51 name=(null) inode=14121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=52 name=(null) inode=14117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=53 name=(null) inode=14122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=55 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=56 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=57 name=(null) inode=14124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=58 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=59 name=(null) inode=14125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=60 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=61 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=62 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=63 name=(null) inode=14127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=64 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=65 name=(null) inode=14128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=66 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=67 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=68 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=69 name=(null) inode=14130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=70 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=71 name=(null) inode=14131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=72 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=73 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=74 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=75 name=(null) inode=14133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=76 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=77 name=(null) inode=14134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=78 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=79 name=(null) inode=14135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=80 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=81 name=(null) inode=14136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=82 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=83 name=(null) inode=14137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=84 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=85 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=86 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=87 name=(null) inode=14139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=88 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=89 name=(null) inode=14140 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=90 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=91 name=(null) inode=14141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=92 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=93 name=(null) inode=14142 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=94 name=(null) inode=14138 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=95 name=(null) inode=14143 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=96 name=(null) inode=14123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=97 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=98 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=99 name=(null) inode=14145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=100 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=101 name=(null) inode=14146 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=102 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=103 name=(null) inode=14147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=104 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=105 name=(null) inode=14148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=106 name=(null) inode=14144 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=107 name=(null) inode=14149 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PATH item=109 name=(null) inode=14150 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:17:42.580000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:17:42.591948 systemd-networkd[1029]: lo: Link UP Oct 31 01:17:42.591957 systemd-networkd[1029]: lo: Gained carrier Oct 31 01:17:42.592311 systemd-networkd[1029]: Enumeration completed Oct 31 01:17:42.592380 systemd[1]: Started systemd-networkd.service. Oct 31 01:17:42.592476 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:17:42.594334 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:17:42.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.594635 systemd-networkd[1029]: eth0: Link UP Oct 31 01:17:42.594777 systemd-networkd[1029]: eth0: Gained carrier Oct 31 01:17:42.605487 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:17:42.609809 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 01:17:42.610094 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:17:42.610111 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 01:17:42.610248 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 01:17:42.624244 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:17:42.632253 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:17:42.704163 kernel: kvm: Nested Virtualization enabled Oct 31 01:17:42.704258 kernel: SVM: kvm: Nested Paging enabled Oct 31 01:17:42.704286 kernel: SVM: Virtual VMLOAD VMSAVE supported Oct 31 01:17:42.705340 kernel: SVM: Virtual GIF supported Oct 31 01:17:42.722262 kernel: EDAC MC: Ver: 3.0.0 Oct 31 01:17:42.744551 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:17:42.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.747103 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:17:42.753755 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:17:42.777739 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:17:42.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.779220 systemd[1]: Reached target cryptsetup.target. Oct 31 01:17:42.781238 systemd[1]: Starting lvm2-activation.service... Oct 31 01:17:42.783887 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:17:42.807910 systemd[1]: Finished lvm2-activation.service. Oct 31 01:17:42.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.809334 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:17:42.810651 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:17:42.810675 systemd[1]: Reached target local-fs.target. Oct 31 01:17:42.811922 systemd[1]: Reached target machines.target. Oct 31 01:17:42.814063 systemd[1]: Starting ldconfig.service... Oct 31 01:17:42.815482 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:17:42.815514 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:42.816179 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:17:42.818402 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:17:42.820894 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:17:42.823673 systemd[1]: Starting systemd-sysext.service... Oct 31 01:17:42.825434 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) Oct 31 01:17:42.826289 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:17:42.836297 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:17:42.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:42.840060 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:17:42.843956 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:17:42.844092 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:17:42.854247 kernel: loop0: detected capacity change from 0 to 224512 Oct 31 01:17:43.124659 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:17:43.126218 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:17:43.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.130195 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) Oct 31 01:17:43.130195 systemd-fsck[1062]: /dev/vda1: 790 files, 120772/258078 clusters Oct 31 01:17:43.130518 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:17:43.131867 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:17:43.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.134859 systemd[1]: Mounting boot.mount... Oct 31 01:17:43.140869 systemd[1]: Mounted boot.mount. Oct 31 01:17:43.146309 kernel: loop1: detected capacity change from 0 to 224512 Oct 31 01:17:43.150995 (sd-sysext)[1068]: Using extensions 'kubernetes'. Oct 31 01:17:43.151305 (sd-sysext)[1068]: Merged extensions into '/usr'. Oct 31 01:17:43.152358 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:17:43.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.167192 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.168335 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:17:43.169799 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.171094 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:17:43.173056 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:17:43.175288 systemd[1]: Starting modprobe@loop.service... Oct 31 01:17:43.176438 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.176546 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:43.176656 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.178893 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:17:43.180328 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:17:43.180430 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:17:43.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.182287 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:17:43.182404 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:17:43.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.184357 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:17:43.184460 systemd[1]: Finished modprobe@loop.service. Oct 31 01:17:43.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.186362 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:17:43.186455 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.187725 systemd[1]: Finished systemd-sysext.service. Oct 31 01:17:43.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.190135 systemd[1]: Starting ensure-sysext.service... Oct 31 01:17:43.192048 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:17:43.196367 systemd[1]: Reloading. Oct 31 01:17:43.198964 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:17:43.203587 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:17:43.205099 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:17:43.207614 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:17:43.243518 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2025-10-31T01:17:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:17:43.243843 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2025-10-31T01:17:43Z" level=info msg="torcx already run" Oct 31 01:17:43.300855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:17:43.300871 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:17:43.317441 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:17:43.367000 audit: BPF prog-id=27 op=LOAD Oct 31 01:17:43.367000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:17:43.367000 audit: BPF prog-id=28 op=LOAD Oct 31 01:17:43.367000 audit: BPF prog-id=29 op=LOAD Oct 31 01:17:43.367000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:17:43.367000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:17:43.368000 audit: BPF prog-id=30 op=LOAD Oct 31 01:17:43.368000 audit: BPF prog-id=31 op=LOAD Oct 31 01:17:43.368000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:17:43.368000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:17:43.370000 audit: BPF prog-id=32 op=LOAD Oct 31 01:17:43.370000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:17:43.370000 audit: BPF prog-id=33 op=LOAD Oct 31 01:17:43.370000 audit: BPF prog-id=34 op=LOAD Oct 31 01:17:43.370000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:17:43.370000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:17:43.371000 audit: BPF prog-id=35 op=LOAD Oct 31 01:17:43.371000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:17:43.373643 systemd[1]: Finished ldconfig.service. Oct 31 01:17:43.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.375996 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:17:43.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.380482 systemd[1]: Starting audit-rules.service... Oct 31 01:17:43.382426 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:17:43.384706 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:17:43.386000 audit: BPF prog-id=36 op=LOAD Oct 31 01:17:43.387458 systemd[1]: Starting systemd-resolved.service... Oct 31 01:17:43.389000 audit: BPF prog-id=37 op=LOAD Oct 31 01:17:43.389941 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:17:43.391963 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:17:43.395176 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:17:43.395000 audit[1148]: SYSTEM_BOOT pid=1148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.399570 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:17:43.401609 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.401817 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.402967 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:17:43.405134 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:17:43.407189 systemd[1]: Starting modprobe@loop.service... Oct 31 01:17:43.408322 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.408414 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:43.409443 systemd[1]: Starting systemd-update-done.service... Oct 31 01:17:43.410754 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:17:43.410831 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.411780 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:17:43.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.413557 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:17:43.413666 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:17:43.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:43.415368 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:17:43.415465 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:17:43.415000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:17:43.415000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1941b670 a2=420 a3=0 items=0 ppid=1137 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:43.415000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:17:43.415779 augenrules[1161]: No rules Oct 31 01:17:43.417180 systemd[1]: Finished audit-rules.service. Oct 31 01:17:43.418656 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:17:43.418749 systemd[1]: Finished modprobe@loop.service. Oct 31 01:17:43.420296 systemd[1]: Finished systemd-update-done.service. Oct 31 01:17:43.423600 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.423778 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.424861 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:17:43.426814 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:17:43.429013 systemd[1]: Starting modprobe@loop.service... Oct 31 01:17:43.430133 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.430241 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:43.430324 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:17:43.430390 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.431118 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:17:43.431221 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:17:43.432791 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:17:43.432893 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:17:43.434516 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:17:43.434610 systemd[1]: Finished modprobe@loop.service. Oct 31 01:17:43.436124 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:17:43.436204 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.438733 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.438964 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.440219 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:17:43.442251 systemd[1]: Starting modprobe@drm.service... Oct 31 01:17:43.444169 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:17:43.446255 systemd[1]: Starting modprobe@loop.service... Oct 31 01:17:43.447502 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.447729 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:43.448736 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:17:43.450247 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:17:43.450448 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:17:43.451341 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:17:43.451436 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:17:43.452372 systemd-resolved[1143]: Positive Trust Anchors: Oct 31 01:17:43.452589 systemd-resolved[1143]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:17:43.452683 systemd-resolved[1143]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:17:43.453080 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:17:43.453170 systemd[1]: Finished modprobe@drm.service. Oct 31 01:17:43.454921 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:17:43.455013 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:17:43.456785 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:17:43.456890 systemd[1]: Finished modprobe@loop.service. Oct 31 01:17:43.458711 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:17:43.458788 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:17:43.459879 systemd[1]: Finished ensure-sysext.service. Oct 31 01:17:43.460001 systemd-resolved[1143]: Defaulting to hostname 'linux'. Oct 31 01:17:43.461510 systemd[1]: Started systemd-resolved.service. Oct 31 01:17:43.463019 systemd[1]: Reached target network.target. Oct 31 01:17:43.464421 systemd[1]: Reached target nss-lookup.target. Oct 31 01:17:43.475971 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:17:43.477547 systemd[1]: Reached target sysinit.target. Oct 31 01:17:43.478985 systemd[1]: Started motdgen.path. Oct 31 01:17:44.510323 systemd-resolved[1143]: Clock change detected. Flushing caches. Oct 31 01:17:44.510370 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 31 01:17:44.510424 systemd-timesyncd[1147]: Initial clock synchronization to Fri 2025-10-31 01:17:44.510281 UTC. Oct 31 01:17:44.510548 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:17:44.512507 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:17:44.514029 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:17:44.514055 systemd[1]: Reached target paths.target. Oct 31 01:17:44.515368 systemd[1]: Reached target time-set.target. Oct 31 01:17:44.516860 systemd[1]: Started logrotate.timer. Oct 31 01:17:44.518233 systemd[1]: Started mdadm.timer. Oct 31 01:17:44.519433 systemd[1]: Reached target timers.target. Oct 31 01:17:44.520990 systemd[1]: Listening on dbus.socket. Oct 31 01:17:44.522963 systemd[1]: Starting docker.socket... Oct 31 01:17:44.526136 systemd[1]: Listening on sshd.socket. Oct 31 01:17:44.527504 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:44.527847 systemd[1]: Listening on docker.socket. Oct 31 01:17:44.529284 systemd[1]: Reached target sockets.target. Oct 31 01:17:44.530681 systemd[1]: Reached target basic.target. Oct 31 01:17:44.531942 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:17:44.531966 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:17:44.532717 systemd[1]: Starting containerd.service... Oct 31 01:17:44.534623 systemd[1]: Starting dbus.service... Oct 31 01:17:44.536404 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:17:44.538567 systemd[1]: Starting extend-filesystems.service... Oct 31 01:17:44.539638 jq[1179]: false Oct 31 01:17:44.539820 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:17:44.540693 systemd[1]: Starting motdgen.service... Oct 31 01:17:44.545557 systemd[1]: Starting prepare-helm.service... Oct 31 01:17:44.547786 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:17:44.550122 systemd[1]: Starting sshd-keygen.service... Oct 31 01:17:44.552060 dbus-daemon[1178]: [system] SELinux support is enabled Oct 31 01:17:44.553295 systemd[1]: Starting systemd-logind.service... Oct 31 01:17:44.555668 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:17:44.555716 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:17:44.556043 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:17:44.556598 systemd[1]: Starting update-engine.service... Oct 31 01:17:44.558576 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:17:44.560463 systemd[1]: Started dbus.service. Oct 31 01:17:44.561161 jq[1197]: true Oct 31 01:17:44.563944 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:17:44.564085 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:17:44.564292 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:17:44.564420 systemd[1]: Finished motdgen.service. Oct 31 01:17:44.566361 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:17:44.566508 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:17:44.569727 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:17:44.574032 jq[1201]: true Oct 31 01:17:44.574218 tar[1200]: linux-amd64/LICENSE Oct 31 01:17:44.574218 tar[1200]: linux-amd64/helm Oct 31 01:17:44.569748 systemd[1]: Reached target system-config.target. Oct 31 01:17:44.571219 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:17:44.571233 systemd[1]: Reached target user-config.target. Oct 31 01:17:44.580931 extend-filesystems[1180]: Found loop1 Oct 31 01:17:44.582501 extend-filesystems[1180]: Found sr0 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda1 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda2 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda3 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found usr Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda4 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda6 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda7 Oct 31 01:17:44.584081 extend-filesystems[1180]: Found vda9 Oct 31 01:17:44.584081 extend-filesystems[1180]: Checking size of /dev/vda9 Oct 31 01:17:44.678805 update_engine[1195]: I1031 01:17:44.664268 1195 main.cc:92] Flatcar Update Engine starting Oct 31 01:17:44.678805 update_engine[1195]: I1031 01:17:44.670012 1195 update_check_scheduler.cc:74] Next update check in 7m19s Oct 31 01:17:44.666073 systemd[1]: Started update-engine.service. Oct 31 01:17:44.679050 env[1202]: time="2025-10-31T01:17:44.653560717Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:17:44.669884 systemd[1]: Started locksmithd.service. Oct 31 01:17:44.670633 systemd-logind[1193]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:17:44.670647 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:17:44.671878 systemd-logind[1193]: New seat seat0. Oct 31 01:17:44.675399 systemd[1]: Started systemd-logind.service. Oct 31 01:17:44.679604 env[1202]: time="2025-10-31T01:17:44.679574181Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:17:44.679772 env[1202]: time="2025-10-31T01:17:44.679754339Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.680977 env[1202]: time="2025-10-31T01:17:44.680949741Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681060 env[1202]: time="2025-10-31T01:17:44.681041333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681282 env[1202]: time="2025-10-31T01:17:44.681263359Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681356 env[1202]: time="2025-10-31T01:17:44.681337438Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681461 env[1202]: time="2025-10-31T01:17:44.681441463Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:17:44.681531 env[1202]: time="2025-10-31T01:17:44.681512867Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681661 env[1202]: time="2025-10-31T01:17:44.681643672Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.681911 env[1202]: time="2025-10-31T01:17:44.681894463Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:17:44.682092 env[1202]: time="2025-10-31T01:17:44.682073789Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:17:44.682163 env[1202]: time="2025-10-31T01:17:44.682144131Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:17:44.682267 env[1202]: time="2025-10-31T01:17:44.682249779Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:17:44.682344 env[1202]: time="2025-10-31T01:17:44.682325411Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:17:44.688494 extend-filesystems[1180]: Resized partition /dev/vda9 Oct 31 01:17:44.709077 extend-filesystems[1233]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 01:17:44.736437 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Oct 31 01:17:44.817870 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:17:44.862904 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Oct 31 01:17:44.916542 systemd-networkd[1029]: eth0: Gained IPv6LL Oct 31 01:17:44.918196 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:17:44.920235 systemd[1]: Reached target network-online.target. Oct 31 01:17:44.923106 systemd[1]: Starting kubelet.service... Oct 31 01:17:45.008934 extend-filesystems[1233]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 01:17:45.008934 extend-filesystems[1233]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 31 01:17:45.008934 extend-filesystems[1233]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Oct 31 01:17:45.025246 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014554128Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014605455Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014617257Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014649287Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014683270Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014697938Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014708909Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014721252Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014745517Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014759954Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014771225Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014787045Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014906439Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:17:45.027046 env[1202]: time="2025-10-31T01:17:45.014993011Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:17:45.009998 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:17:45.027350 bash[1218]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015235476Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015256716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015267326Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015321257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015332408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015342757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015365360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015376010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015385848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015397520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015505863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015521362Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015637229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015664210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.027592 env[1202]: time="2025-10-31T01:17:45.015675090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.010163 systemd[1]: Finished extend-filesystems.service. Oct 31 01:17:45.027994 env[1202]: time="2025-10-31T01:17:45.015685560Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:17:45.027994 env[1202]: time="2025-10-31T01:17:45.015699106Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:17:45.027994 env[1202]: time="2025-10-31T01:17:45.015708954Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:17:45.027994 env[1202]: time="2025-10-31T01:17:45.015736936Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:17:45.027994 env[1202]: time="2025-10-31T01:17:45.015769938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:17:45.018504 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.015983248Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.016040005Z" level=info msg="Connect containerd service" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.016081843Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.016598893Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022344628Z" level=info msg="Start subscribing containerd event" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022443574Z" level=info msg="Start recovering state" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022496994Z" level=info msg="Start event monitor" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022509327Z" level=info msg="Start snapshots syncer" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022575301Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:17:45.028147 env[1202]: time="2025-10-31T01:17:45.022582615Z" level=info msg="Start streaming server" Oct 31 01:17:45.028912 env[1202]: time="2025-10-31T01:17:45.028844328Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:17:45.028938 env[1202]: time="2025-10-31T01:17:45.028916262Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:17:45.029355 env[1202]: time="2025-10-31T01:17:45.029117169Z" level=info msg="containerd successfully booted in 0.413049s" Oct 31 01:17:45.029329 systemd[1]: Started containerd.service. Oct 31 01:17:45.168155 tar[1200]: linux-amd64/README.md Oct 31 01:17:45.172367 systemd[1]: Finished prepare-helm.service. Oct 31 01:17:45.539917 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:17:45.557232 systemd[1]: Finished sshd-keygen.service. Oct 31 01:17:45.560120 systemd[1]: Starting issuegen.service... Oct 31 01:17:45.564571 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:17:45.564734 systemd[1]: Finished issuegen.service. Oct 31 01:17:45.567491 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:17:45.571919 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:17:45.574743 systemd[1]: Started getty@tty1.service. Oct 31 01:17:45.577284 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:17:45.579293 systemd[1]: Reached target getty.target. Oct 31 01:17:45.650836 systemd[1]: Started kubelet.service. Oct 31 01:17:45.652555 systemd[1]: Reached target multi-user.target. Oct 31 01:17:45.655043 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:17:45.661276 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:17:45.661436 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:17:45.663400 systemd[1]: Startup finished in 813ms (kernel) + 4.492s (initrd) + 5.427s (userspace) = 10.732s. Oct 31 01:17:46.042863 kubelet[1261]: E1031 01:17:46.042813 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:17:46.044600 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:17:46.044713 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:17:48.979779 systemd[1]: Created slice system-sshd.slice. Oct 31 01:17:48.980721 systemd[1]: Started sshd@0-10.0.0.142:22-10.0.0.1:59438.service. Oct 31 01:17:49.018205 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 59438 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.019714 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.026668 systemd[1]: Created slice user-500.slice. Oct 31 01:17:49.027652 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:17:49.029103 systemd-logind[1193]: New session 1 of user core. Oct 31 01:17:49.034393 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:17:49.035594 systemd[1]: Starting user@500.service... Oct 31 01:17:49.037640 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.101578 systemd[1273]: Queued start job for default target default.target. Oct 31 01:17:49.101967 systemd[1273]: Reached target paths.target. Oct 31 01:17:49.101986 systemd[1273]: Reached target sockets.target. Oct 31 01:17:49.101998 systemd[1273]: Reached target timers.target. Oct 31 01:17:49.102008 systemd[1273]: Reached target basic.target. Oct 31 01:17:49.102039 systemd[1273]: Reached target default.target. Oct 31 01:17:49.102060 systemd[1273]: Startup finished in 60ms. Oct 31 01:17:49.102097 systemd[1]: Started user@500.service. Oct 31 01:17:49.102837 systemd[1]: Started session-1.scope. Oct 31 01:17:49.152230 systemd[1]: Started sshd@1-10.0.0.142:22-10.0.0.1:59452.service. Oct 31 01:17:49.187425 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 59452 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.188423 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.191320 systemd-logind[1193]: New session 2 of user core. Oct 31 01:17:49.192191 systemd[1]: Started session-2.scope. Oct 31 01:17:49.243474 sshd[1282]: pam_unix(sshd:session): session closed for user core Oct 31 01:17:49.246029 systemd[1]: sshd@1-10.0.0.142:22-10.0.0.1:59452.service: Deactivated successfully. Oct 31 01:17:49.246614 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 01:17:49.247148 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. Oct 31 01:17:49.248391 systemd[1]: Started sshd@2-10.0.0.142:22-10.0.0.1:59458.service. Oct 31 01:17:49.249018 systemd-logind[1193]: Removed session 2. Oct 31 01:17:49.282053 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 59458 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.282948 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.285911 systemd-logind[1193]: New session 3 of user core. Oct 31 01:17:49.286665 systemd[1]: Started session-3.scope. Oct 31 01:17:49.334872 sshd[1288]: pam_unix(sshd:session): session closed for user core Oct 31 01:17:49.337203 systemd[1]: sshd@2-10.0.0.142:22-10.0.0.1:59458.service: Deactivated successfully. Oct 31 01:17:49.337693 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 01:17:49.338119 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. Oct 31 01:17:49.338963 systemd[1]: Started sshd@3-10.0.0.142:22-10.0.0.1:59474.service. Oct 31 01:17:49.339766 systemd-logind[1193]: Removed session 3. Oct 31 01:17:49.373097 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 59474 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.374030 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.376874 systemd-logind[1193]: New session 4 of user core. Oct 31 01:17:49.377594 systemd[1]: Started session-4.scope. Oct 31 01:17:49.428891 sshd[1294]: pam_unix(sshd:session): session closed for user core Oct 31 01:17:49.431795 systemd[1]: Started sshd@4-10.0.0.142:22-10.0.0.1:59476.service. Oct 31 01:17:49.432228 systemd[1]: sshd@3-10.0.0.142:22-10.0.0.1:59474.service: Deactivated successfully. Oct 31 01:17:49.432695 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:17:49.433068 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:17:49.433707 systemd-logind[1193]: Removed session 4. Oct 31 01:17:49.465721 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 59476 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.466676 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.469331 systemd-logind[1193]: New session 5 of user core. Oct 31 01:17:49.469984 systemd[1]: Started session-5.scope. Oct 31 01:17:49.523038 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:17:49.523222 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:17:49.529598 dbus-daemon[1178]: \xd0=\x94\xf4\xf2U: received setenforce notice (enforcing=-1044428880) Oct 31 01:17:49.531636 sudo[1304]: pam_unix(sudo:session): session closed for user root Oct 31 01:17:49.533271 sshd[1300]: pam_unix(sshd:session): session closed for user core Oct 31 01:17:49.535750 systemd[1]: sshd@4-10.0.0.142:22-10.0.0.1:59476.service: Deactivated successfully. Oct 31 01:17:49.536237 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:17:49.536718 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:17:49.537650 systemd[1]: Started sshd@5-10.0.0.142:22-10.0.0.1:59492.service. Oct 31 01:17:49.538214 systemd-logind[1193]: Removed session 5. Oct 31 01:17:49.572010 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 59492 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.572963 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.575545 systemd-logind[1193]: New session 6 of user core. Oct 31 01:17:49.576228 systemd[1]: Started session-6.scope. Oct 31 01:17:49.626581 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:17:49.626766 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:17:49.629142 sudo[1312]: pam_unix(sudo:session): session closed for user root Oct 31 01:17:49.633259 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:17:49.633477 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:17:49.641156 systemd[1]: Stopping audit-rules.service... Oct 31 01:17:49.641000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:17:49.642432 auditctl[1315]: No rules Oct 31 01:17:49.642747 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:17:49.642871 systemd[1]: Stopped audit-rules.service. Oct 31 01:17:49.643641 kernel: kauditd_printk_skb: 248 callbacks suppressed Oct 31 01:17:49.643693 kernel: audit: type=1305 audit(1761873469.641:192): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:17:49.644046 systemd[1]: Starting audit-rules.service... Oct 31 01:17:49.641000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe45669540 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:49.654211 kernel: audit: type=1300 audit(1761873469.641:192): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe45669540 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:49.654253 kernel: audit: type=1327 audit(1761873469.641:192): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:17:49.641000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:17:49.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.661522 augenrules[1332]: No rules Oct 31 01:17:49.661678 kernel: audit: type=1131 audit(1761873469.642:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.662236 systemd[1]: Finished audit-rules.service. Oct 31 01:17:49.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.662961 sudo[1311]: pam_unix(sudo:session): session closed for user root Oct 31 01:17:49.664180 sshd[1308]: pam_unix(sshd:session): session closed for user core Oct 31 01:17:49.666267 systemd[1]: sshd@5-10.0.0.142:22-10.0.0.1:59492.service: Deactivated successfully. Oct 31 01:17:49.666718 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:17:49.667224 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:17:49.668201 systemd[1]: Started sshd@6-10.0.0.142:22-10.0.0.1:59494.service. Oct 31 01:17:49.668976 systemd-logind[1193]: Removed session 6. Oct 31 01:17:49.662000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.676789 kernel: audit: type=1130 audit(1761873469.662:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.676851 kernel: audit: type=1106 audit(1761873469.662:195): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.662000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.683784 kernel: audit: type=1104 audit(1761873469.662:196): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.683831 kernel: audit: type=1106 audit(1761873469.664:197): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.664000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.664000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.700461 kernel: audit: type=1104 audit(1761873469.664:198): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.700509 kernel: audit: type=1131 audit(1761873469.666:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:59492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:59492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.703820 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 59494 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:17:49.707825 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:17:49.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:59494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.703000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.707000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.707000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde1ef2c0 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:49.707000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:17:49.711250 systemd-logind[1193]: New session 7 of user core. Oct 31 01:17:49.711982 systemd[1]: Started session-7.scope. Oct 31 01:17:49.714000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.716000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:17:49.761000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.762160 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:17:49.761000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.762345 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:17:49.763000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:17:49.781476 systemd[1]: Starting docker.service... Oct 31 01:17:49.815350 env[1353]: time="2025-10-31T01:17:49.815308657Z" level=info msg="Starting up" Oct 31 01:17:49.816913 env[1353]: time="2025-10-31T01:17:49.816864024Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 01:17:49.816913 env[1353]: time="2025-10-31T01:17:49.816899660Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 01:17:49.816974 env[1353]: time="2025-10-31T01:17:49.816918776Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 01:17:49.816974 env[1353]: time="2025-10-31T01:17:49.816928094Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 01:17:49.820066 env[1353]: time="2025-10-31T01:17:49.820044759Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 01:17:49.820066 env[1353]: time="2025-10-31T01:17:49.820060588Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 01:17:49.820138 env[1353]: time="2025-10-31T01:17:49.820073773Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 01:17:49.820138 env[1353]: time="2025-10-31T01:17:49.820083601Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 01:17:49.824555 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3494901975-merged.mount: Deactivated successfully. Oct 31 01:17:50.666862 env[1353]: time="2025-10-31T01:17:50.666809545Z" level=info msg="Loading containers: start." Oct 31 01:17:50.712000 audit[1387]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.712000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc663b1660 a2=0 a3=7ffc663b164c items=0 ppid=1353 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 31 01:17:50.713000 audit[1389]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.713000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffda1b8bab0 a2=0 a3=7ffda1b8ba9c items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 31 01:17:50.714000 audit[1391]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.714000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc359e0ba0 a2=0 a3=7ffc359e0b8c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.714000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 01:17:50.716000 audit[1393]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.716000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff87d14f10 a2=0 a3=7fff87d14efc items=0 ppid=1353 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.716000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 01:17:50.717000 audit[1395]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.717000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0af8bff0 a2=0 a3=7ffe0af8bfdc items=0 ppid=1353 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 31 01:17:50.732000 audit[1400]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.732000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff45434270 a2=0 a3=7fff4543425c items=0 ppid=1353 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 31 01:17:50.740000 audit[1402]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.740000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcdbf6b0a0 a2=0 a3=7ffcdbf6b08c items=0 ppid=1353 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 31 01:17:50.741000 audit[1404]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.741000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff6e118130 a2=0 a3=7fff6e11811c items=0 ppid=1353 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 31 01:17:50.743000 audit[1406]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.743000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd056975a0 a2=0 a3=7ffd0569758c items=0 ppid=1353 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:17:50.751000 audit[1410]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.751000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffec4faef60 a2=0 a3=7ffec4faef4c items=0 ppid=1353 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:17:50.756000 audit[1411]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.756000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7bc760b0 a2=0 a3=7fff7bc7609c items=0 ppid=1353 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:17:50.765438 kernel: Initializing XFRM netlink socket Oct 31 01:17:50.790172 env[1353]: time="2025-10-31T01:17:50.790130245Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 31 01:17:50.803000 audit[1419]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.803000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffccd697530 a2=0 a3=7ffccd69751c items=0 ppid=1353 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 31 01:17:50.829000 audit[1422]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.829000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffea988bd00 a2=0 a3=7ffea988bcec items=0 ppid=1353 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 31 01:17:50.831000 audit[1425]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.831000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc7ed35230 a2=0 a3=7ffc7ed3521c items=0 ppid=1353 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 31 01:17:50.832000 audit[1427]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.832000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffc3cc7690 a2=0 a3=7fffc3cc767c items=0 ppid=1353 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 31 01:17:50.834000 audit[1429]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.834000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe7ac9a220 a2=0 a3=7ffe7ac9a20c items=0 ppid=1353 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 31 01:17:50.835000 audit[1431]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.835000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe66ba1b60 a2=0 a3=7ffe66ba1b4c items=0 ppid=1353 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.835000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 31 01:17:50.837000 audit[1433]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.837000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc190af4c0 a2=0 a3=7ffc190af4ac items=0 ppid=1353 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.837000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 31 01:17:50.843000 audit[1436]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.843000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffefd30d10 a2=0 a3=7fffefd30cfc items=0 ppid=1353 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 31 01:17:50.844000 audit[1438]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.844000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe1107c3f0 a2=0 a3=7ffe1107c3dc items=0 ppid=1353 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 01:17:50.846000 audit[1440]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.846000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff14b124a0 a2=0 a3=7fff14b1248c items=0 ppid=1353 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.846000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 01:17:50.847000 audit[1442]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.847000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd720dc4f0 a2=0 a3=7ffd720dc4dc items=0 ppid=1353 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 31 01:17:50.848337 systemd-networkd[1029]: docker0: Link UP Oct 31 01:17:50.858000 audit[1447]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.858000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7fc90df0 a2=0 a3=7ffd7fc90ddc items=0 ppid=1353 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.858000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:17:50.867000 audit[1448]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:17:50.867000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd9b5165a0 a2=0 a3=7ffd9b51658c items=0 ppid=1353 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:17:50.867000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:17:50.868579 env[1353]: time="2025-10-31T01:17:50.868543077Z" level=info msg="Loading containers: done." Oct 31 01:17:50.876336 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck430312728-merged.mount: Deactivated successfully. Oct 31 01:17:50.881752 env[1353]: time="2025-10-31T01:17:50.881706473Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 31 01:17:50.881906 env[1353]: time="2025-10-31T01:17:50.881880109Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 31 01:17:50.881975 env[1353]: time="2025-10-31T01:17:50.881955140Z" level=info msg="Daemon has completed initialization" Oct 31 01:17:50.897289 systemd[1]: Started docker.service. Oct 31 01:17:50.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:50.900846 env[1353]: time="2025-10-31T01:17:50.900800331Z" level=info msg="API listen on /run/docker.sock" Oct 31 01:17:51.553646 env[1202]: time="2025-10-31T01:17:51.553596717Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\"" Oct 31 01:17:52.080894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount609756119.mount: Deactivated successfully. Oct 31 01:17:53.501333 env[1202]: time="2025-10-31T01:17:53.501280289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:53.503304 env[1202]: time="2025-10-31T01:17:53.503266694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:53.505071 env[1202]: time="2025-10-31T01:17:53.505051021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:53.506753 env[1202]: time="2025-10-31T01:17:53.506708008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6df11cc2ad9679b1117be34d3a0230add88bc0a08fd7a3ebc26b680575e8de97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:53.507361 env[1202]: time="2025-10-31T01:17:53.507327640Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\" returns image reference \"sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59\"" Oct 31 01:17:53.508053 env[1202]: time="2025-10-31T01:17:53.508028875Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\"" Oct 31 01:17:54.978290 env[1202]: time="2025-10-31T01:17:54.978192637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:54.980160 env[1202]: time="2025-10-31T01:17:54.980137464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:54.982075 env[1202]: time="2025-10-31T01:17:54.982013983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:54.983732 env[1202]: time="2025-10-31T01:17:54.983691038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:243c4b8e3bce271fcb1b78008ab996ab6976b1a20096deac08338fcd17979922,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:54.984405 env[1202]: time="2025-10-31T01:17:54.984344714Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\" returns image reference \"sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91\"" Oct 31 01:17:54.984986 env[1202]: time="2025-10-31T01:17:54.984950981Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\"" Oct 31 01:17:56.160729 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 01:17:56.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.160901 systemd[1]: Stopped kubelet.service. Oct 31 01:17:56.162116 systemd[1]: Starting kubelet.service... Oct 31 01:17:56.162438 kernel: kauditd_printk_skb: 84 callbacks suppressed Oct 31 01:17:56.162478 kernel: audit: type=1130 audit(1761873476.160:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.172677 kernel: audit: type=1131 audit(1761873476.160:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.244508 systemd[1]: Started kubelet.service. Oct 31 01:17:56.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.250433 kernel: audit: type=1130 audit(1761873476.244:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:17:56.583325 kubelet[1489]: E1031 01:17:56.583237 1489 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:17:56.586565 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:17:56.586702 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:17:56.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:17:56.592442 kernel: audit: type=1131 audit(1761873476.586:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:17:57.565876 env[1202]: time="2025-10-31T01:17:57.565817287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:57.569524 env[1202]: time="2025-10-31T01:17:57.569496196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:57.571803 env[1202]: time="2025-10-31T01:17:57.571781502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:57.573423 env[1202]: time="2025-10-31T01:17:57.573383927Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:50c49520dbd0e8b4076b6a5c77d8014df09ea3d59a73e8bafd2678d51ebb92d5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:57.574046 env[1202]: time="2025-10-31T01:17:57.574011013Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\" returns image reference \"sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5\"" Oct 31 01:17:57.574484 env[1202]: time="2025-10-31T01:17:57.574405313Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 31 01:17:58.543940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3625197112.mount: Deactivated successfully. Oct 31 01:17:59.610165 env[1202]: time="2025-10-31T01:17:59.610108813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:59.611952 env[1202]: time="2025-10-31T01:17:59.611908007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:59.613236 env[1202]: time="2025-10-31T01:17:59.613207585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:59.614534 env[1202]: time="2025-10-31T01:17:59.614515828Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:17:59.614865 env[1202]: time="2025-10-31T01:17:59.614845196Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 31 01:17:59.615275 env[1202]: time="2025-10-31T01:17:59.615255916Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Oct 31 01:18:00.155820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2653592518.mount: Deactivated successfully. Oct 31 01:18:01.085084 env[1202]: time="2025-10-31T01:18:01.085023855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.087028 env[1202]: time="2025-10-31T01:18:01.086970546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.088674 env[1202]: time="2025-10-31T01:18:01.088653643Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.090302 env[1202]: time="2025-10-31T01:18:01.090271747Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.091005 env[1202]: time="2025-10-31T01:18:01.090961300Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Oct 31 01:18:01.091472 env[1202]: time="2025-10-31T01:18:01.091443264Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 31 01:18:01.604953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3723577764.mount: Deactivated successfully. Oct 31 01:18:01.609874 env[1202]: time="2025-10-31T01:18:01.609830535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.611479 env[1202]: time="2025-10-31T01:18:01.611454190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.612904 env[1202]: time="2025-10-31T01:18:01.612872470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.614288 env[1202]: time="2025-10-31T01:18:01.614252157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:01.614618 env[1202]: time="2025-10-31T01:18:01.614592025Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 31 01:18:01.614994 env[1202]: time="2025-10-31T01:18:01.614973230Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Oct 31 01:18:02.166788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount715767432.mount: Deactivated successfully. Oct 31 01:18:05.268879 env[1202]: time="2025-10-31T01:18:05.268834143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:05.270770 env[1202]: time="2025-10-31T01:18:05.270724398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:05.272255 env[1202]: time="2025-10-31T01:18:05.272228469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:05.273879 env[1202]: time="2025-10-31T01:18:05.273856682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:05.274662 env[1202]: time="2025-10-31T01:18:05.274636244Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Oct 31 01:18:06.660615 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 01:18:06.660773 systemd[1]: Stopped kubelet.service. Oct 31 01:18:06.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.661950 systemd[1]: Starting kubelet.service... Oct 31 01:18:06.672468 kernel: audit: type=1130 audit(1761873486.660:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.672565 kernel: audit: type=1131 audit(1761873486.660:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.745400 systemd[1]: Started kubelet.service. Oct 31 01:18:06.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.751439 kernel: audit: type=1130 audit(1761873486.745:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:06.779295 kubelet[1522]: E1031 01:18:06.779237 1522 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:18:06.780984 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:18:06.781098 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:18:06.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:18:06.787441 kernel: audit: type=1131 audit(1761873486.780:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:18:07.178107 systemd[1]: Stopped kubelet.service. Oct 31 01:18:07.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:07.179963 systemd[1]: Starting kubelet.service... Oct 31 01:18:07.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:07.190578 kernel: audit: type=1130 audit(1761873487.177:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:07.190644 kernel: audit: type=1131 audit(1761873487.177:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:07.202610 systemd[1]: Reloading. Oct 31 01:18:07.270483 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-10-31T01:18:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:18:07.270507 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-10-31T01:18:07Z" level=info msg="torcx already run" Oct 31 01:18:07.964580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:18:07.964597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:18:07.981164 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:18:08.047693 kernel: audit: type=1400 audit(1761873488.037:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047740 kernel: audit: type=1400 audit(1761873488.037:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052653 kernel: audit: type=1400 audit(1761873488.037:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052699 kernel: audit: type=1400 audit(1761873488.037:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit: BPF prog-id=43 op=LOAD Oct 31 01:18:08.047000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit: BPF prog-id=44 op=LOAD Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit: BPF prog-id=45 op=LOAD Oct 31 01:18:08.052000 audit: BPF prog-id=28 op=UNLOAD Oct 31 01:18:08.052000 audit: BPF prog-id=29 op=UNLOAD Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit: BPF prog-id=46 op=LOAD Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.057000 audit: BPF prog-id=47 op=LOAD Oct 31 01:18:08.057000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:18:08.057000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.058000 audit: BPF prog-id=48 op=LOAD Oct 31 01:18:08.058000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit: BPF prog-id=49 op=LOAD Oct 31 01:18:08.059000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit: BPF prog-id=50 op=LOAD Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.059000 audit: BPF prog-id=51 op=LOAD Oct 31 01:18:08.059000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:18:08.059000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit: BPF prog-id=52 op=LOAD Oct 31 01:18:08.061000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit: BPF prog-id=53 op=LOAD Oct 31 01:18:08.062000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit: BPF prog-id=54 op=LOAD Oct 31 01:18:08.063000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit: BPF prog-id=55 op=LOAD Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit: BPF prog-id=56 op=LOAD Oct 31 01:18:08.063000 audit: BPF prog-id=39 op=UNLOAD Oct 31 01:18:08.063000 audit: BPF prog-id=40 op=UNLOAD Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.063000 audit: BPF prog-id=57 op=LOAD Oct 31 01:18:08.064000 audit: BPF prog-id=41 op=UNLOAD Oct 31 01:18:08.073355 systemd[1]: Started kubelet.service. Oct 31 01:18:08.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:08.074467 systemd[1]: Stopping kubelet.service... Oct 31 01:18:08.074730 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:18:08.074874 systemd[1]: Stopped kubelet.service. Oct 31 01:18:08.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:08.076100 systemd[1]: Starting kubelet.service... Oct 31 01:18:08.158226 systemd[1]: Started kubelet.service. Oct 31 01:18:08.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:08.191025 kubelet[1604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:08.191025 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:18:08.191025 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:08.191331 kubelet[1604]: I1031 01:18:08.191096 1604 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:18:08.462275 kubelet[1604]: I1031 01:18:08.462238 1604 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 01:18:08.462275 kubelet[1604]: I1031 01:18:08.462265 1604 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:18:08.462549 kubelet[1604]: I1031 01:18:08.462526 1604 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 01:18:08.481729 kubelet[1604]: E1031 01:18:08.481682 1604 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.142:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:08.482578 kubelet[1604]: I1031 01:18:08.482557 1604 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:18:08.489028 kubelet[1604]: E1031 01:18:08.488991 1604 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:18:08.489028 kubelet[1604]: I1031 01:18:08.489027 1604 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:18:08.492420 kubelet[1604]: I1031 01:18:08.492381 1604 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:18:08.493967 kubelet[1604]: I1031 01:18:08.493928 1604 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:18:08.494123 kubelet[1604]: I1031 01:18:08.493960 1604 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:18:08.494123 kubelet[1604]: I1031 01:18:08.494124 1604 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:18:08.494230 kubelet[1604]: I1031 01:18:08.494132 1604 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 01:18:08.494230 kubelet[1604]: I1031 01:18:08.494227 1604 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:08.496493 kubelet[1604]: I1031 01:18:08.496473 1604 kubelet.go:446] "Attempting to sync node with API server" Oct 31 01:18:08.496528 kubelet[1604]: I1031 01:18:08.496496 1604 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:18:08.496528 kubelet[1604]: I1031 01:18:08.496512 1604 kubelet.go:352] "Adding apiserver pod source" Oct 31 01:18:08.496528 kubelet[1604]: I1031 01:18:08.496525 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:18:08.511635 kubelet[1604]: I1031 01:18:08.511599 1604 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:18:08.511924 kubelet[1604]: I1031 01:18:08.511900 1604 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 01:18:08.518581 kubelet[1604]: W1031 01:18:08.518553 1604 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:18:08.530208 kubelet[1604]: I1031 01:18:08.530192 1604 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:18:08.530254 kubelet[1604]: I1031 01:18:08.530223 1604 server.go:1287] "Started kubelet" Oct 31 01:18:08.530782 kubelet[1604]: W1031 01:18:08.530550 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.142:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:08.530782 kubelet[1604]: E1031 01:18:08.530600 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.142:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:08.530782 kubelet[1604]: W1031 01:18:08.530643 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.142:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:08.530782 kubelet[1604]: E1031 01:18:08.530666 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.142:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:08.530782 kubelet[1604]: I1031 01:18:08.530693 1604 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:18:08.531472 kubelet[1604]: I1031 01:18:08.531455 1604 server.go:479] "Adding debug handlers to kubelet server" Oct 31 01:18:08.531000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.531000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:08.531000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000711f50 a1=c000bee330 a2=c000711f20 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:08.531000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.531000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:08.531000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000423720 a1=c000bee348 a2=c000bf0000 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:08.532184 kubelet[1604]: I1031 01:18:08.531897 1604 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:18:08.532184 kubelet[1604]: I1031 01:18:08.531967 1604 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:18:08.532184 kubelet[1604]: I1031 01:18:08.532018 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:18:08.534000 audit[1617]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.534000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0d181c30 a2=0 a3=7ffe0d181c1c items=0 ppid=1604 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:18:08.535000 audit[1618]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.535000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd7e419d0 a2=0 a3=7ffdd7e419bc items=0 ppid=1604 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:18:08.541374 kubelet[1604]: I1031 01:18:08.541302 1604 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:18:08.541577 kubelet[1604]: I1031 01:18:08.541554 1604 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:18:08.541685 kubelet[1604]: I1031 01:18:08.541630 1604 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:18:08.542041 kubelet[1604]: I1031 01:18:08.542014 1604 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:18:08.550826 kubelet[1604]: I1031 01:18:08.550801 1604 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:18:08.550926 kubelet[1604]: E1031 01:18:08.550885 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:08.550926 kubelet[1604]: I1031 01:18:08.550902 1604 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:18:08.551013 kubelet[1604]: E1031 01:18:08.550979 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.142:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.142:6443: connect: connection refused" interval="200ms" Oct 31 01:18:08.551396 kubelet[1604]: I1031 01:18:08.551370 1604 factory.go:221] Registration of the systemd container factory successfully Oct 31 01:18:08.551607 kubelet[1604]: I1031 01:18:08.551581 1604 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:18:08.552000 audit[1620]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.552000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff41176fd0 a2=0 a3=7fff41176fbc items=0 ppid=1604 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:08.552690 kubelet[1604]: W1031 01:18:08.552646 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.142:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:08.552745 kubelet[1604]: E1031 01:18:08.552692 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.142:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:08.553191 kubelet[1604]: E1031 01:18:08.553172 1604 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:18:08.553687 kubelet[1604]: I1031 01:18:08.553557 1604 factory.go:221] Registration of the containerd container factory successfully Oct 31 01:18:08.557654 kubelet[1604]: E1031 01:18:08.556707 1604 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.142:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.142:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18736e9a5f0560fa default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-10-31 01:18:08.530202874 +0000 UTC m=+0.368753396,LastTimestamp:2025-10-31 01:18:08.530202874 +0000 UTC m=+0.368753396,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Oct 31 01:18:08.558000 audit[1625]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.558000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0bf14e90 a2=0 a3=7ffc0bf14e7c items=0 ppid=1604 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:08.563685 kubelet[1604]: I1031 01:18:08.563659 1604 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:18:08.563685 kubelet[1604]: I1031 01:18:08.563675 1604 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:18:08.563685 kubelet[1604]: I1031 01:18:08.563687 1604 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:08.563000 audit[1630]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.563000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe6fd0ffa0 a2=0 a3=7ffe6fd0ff8c items=0 ppid=1604 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 01:18:08.564804 kubelet[1604]: I1031 01:18:08.564766 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 01:18:08.565000 audit[1633]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.565000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc17ff5890 a2=0 a3=7ffc17ff587c items=0 ppid=1604 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:18:08.565000 audit[1632]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:08.565000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe78ae0090 a2=0 a3=7ffe78ae007c items=0 ppid=1604 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:18:08.565967 kubelet[1604]: I1031 01:18:08.565923 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 01:18:08.565967 kubelet[1604]: I1031 01:18:08.565959 1604 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 01:18:08.566042 kubelet[1604]: I1031 01:18:08.565982 1604 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:18:08.566042 kubelet[1604]: I1031 01:18:08.565991 1604 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 01:18:08.566093 kubelet[1604]: E1031 01:18:08.566043 1604 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 01:18:08.565000 audit[1634]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.565000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd780f68d0 a2=0 a3=7ffd780f68bc items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:18:08.566000 audit[1635]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:08.566000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe39e4d200 a2=0 a3=7ffe39e4d1ec items=0 ppid=1604 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:18:08.566000 audit[1636]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:08.566000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8ec1ade0 a2=0 a3=7ffd8ec1adcc items=0 ppid=1604 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:18:08.567000 audit[1637]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:08.567000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe4e3e8980 a2=0 a3=7ffe4e3e896c items=0 ppid=1604 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:18:08.568000 audit[1638]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:08.568000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9326dbe0 a2=0 a3=7fff9326dbcc items=0 ppid=1604 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:18:08.651010 kubelet[1604]: E1031 01:18:08.650983 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:08.666168 kubelet[1604]: E1031 01:18:08.666132 1604 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 31 01:18:08.751133 kubelet[1604]: E1031 01:18:08.751069 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:08.751374 kubelet[1604]: E1031 01:18:08.751349 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.142:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.142:6443: connect: connection refused" interval="400ms" Oct 31 01:18:08.851532 kubelet[1604]: E1031 01:18:08.851493 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:08.866712 kubelet[1604]: E1031 01:18:08.866664 1604 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 31 01:18:08.873474 kubelet[1604]: I1031 01:18:08.873441 1604 policy_none.go:49] "None policy: Start" Oct 31 01:18:08.873527 kubelet[1604]: I1031 01:18:08.873487 1604 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:18:08.873527 kubelet[1604]: I1031 01:18:08.873500 1604 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:18:08.873578 kubelet[1604]: W1031 01:18:08.873536 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.142:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:08.873619 kubelet[1604]: E1031 01:18:08.873594 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.142:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:08.878081 systemd[1]: Created slice kubepods.slice. Oct 31 01:18:08.881519 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:18:08.883816 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:18:08.897080 kubelet[1604]: I1031 01:18:08.897060 1604 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 01:18:08.896000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:08.896000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:08.896000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e79d70 a1=c000ecbbf0 a2=c000e79d40 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:08.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:08.897292 kubelet[1604]: I1031 01:18:08.897119 1604 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 01:18:08.897292 kubelet[1604]: I1031 01:18:08.897233 1604 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:18:08.897292 kubelet[1604]: I1031 01:18:08.897243 1604 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:18:08.897850 kubelet[1604]: I1031 01:18:08.897825 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:18:08.898598 kubelet[1604]: E1031 01:18:08.898574 1604 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:18:08.898655 kubelet[1604]: E1031 01:18:08.898611 1604 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 31 01:18:08.998691 kubelet[1604]: I1031 01:18:08.998658 1604 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:18:08.998954 kubelet[1604]: E1031 01:18:08.998919 1604 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.142:6443/api/v1/nodes\": dial tcp 10.0.0.142:6443: connect: connection refused" node="localhost" Oct 31 01:18:09.152022 kubelet[1604]: E1031 01:18:09.151927 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.142:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.142:6443: connect: connection refused" interval="800ms" Oct 31 01:18:09.199685 kubelet[1604]: I1031 01:18:09.199657 1604 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:18:09.199927 kubelet[1604]: E1031 01:18:09.199888 1604 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.142:6443/api/v1/nodes\": dial tcp 10.0.0.142:6443: connect: connection refused" node="localhost" Oct 31 01:18:09.275248 systemd[1]: Created slice kubepods-burstable-pod4654b122dbb389158fe3c0766e603624.slice. Oct 31 01:18:09.280957 kubelet[1604]: E1031 01:18:09.280925 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:09.283010 systemd[1]: Created slice kubepods-burstable-poda1d51be1ff02022474f2598f6e43038f.slice. Oct 31 01:18:09.288197 kubelet[1604]: E1031 01:18:09.288164 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:09.289889 systemd[1]: Created slice kubepods-burstable-pod612f33402cf5c88e92118ae716d8136a.slice. Oct 31 01:18:09.291137 kubelet[1604]: E1031 01:18:09.291111 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:09.353468 kubelet[1604]: I1031 01:18:09.353433 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a1d51be1ff02022474f2598f6e43038f-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a1d51be1ff02022474f2598f6e43038f\") " pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:09.353468 kubelet[1604]: I1031 01:18:09.353461 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:09.353556 kubelet[1604]: I1031 01:18:09.353483 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:09.353556 kubelet[1604]: I1031 01:18:09.353503 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:09.353556 kubelet[1604]: I1031 01:18:09.353525 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:09.353556 kubelet[1604]: I1031 01:18:09.353538 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:09.353556 kubelet[1604]: I1031 01:18:09.353551 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:09.353664 kubelet[1604]: I1031 01:18:09.353564 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:09.353664 kubelet[1604]: I1031 01:18:09.353577 1604 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:09.581482 kubelet[1604]: E1031 01:18:09.581453 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:09.581958 env[1202]: time="2025-10-31T01:18:09.581918927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4654b122dbb389158fe3c0766e603624,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:09.589143 kubelet[1604]: E1031 01:18:09.589110 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:09.589553 env[1202]: time="2025-10-31T01:18:09.589508129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a1d51be1ff02022474f2598f6e43038f,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:09.591703 kubelet[1604]: E1031 01:18:09.591676 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:09.592047 env[1202]: time="2025-10-31T01:18:09.592003349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:612f33402cf5c88e92118ae716d8136a,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:09.600717 kubelet[1604]: I1031 01:18:09.600699 1604 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:18:09.600994 kubelet[1604]: E1031 01:18:09.600963 1604 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.142:6443/api/v1/nodes\": dial tcp 10.0.0.142:6443: connect: connection refused" node="localhost" Oct 31 01:18:09.777281 kubelet[1604]: W1031 01:18:09.777207 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.142:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:09.777342 kubelet[1604]: E1031 01:18:09.777284 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.142:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:09.952546 kubelet[1604]: E1031 01:18:09.952507 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.142:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.142:6443: connect: connection refused" interval="1.6s" Oct 31 01:18:10.009193 kubelet[1604]: W1031 01:18:10.009122 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.142:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:10.009193 kubelet[1604]: E1031 01:18:10.009177 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.142:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:10.047971 kubelet[1604]: W1031 01:18:10.047927 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.142:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:10.047971 kubelet[1604]: E1031 01:18:10.047953 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.142:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:10.086794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3972820784.mount: Deactivated successfully. Oct 31 01:18:10.092385 env[1202]: time="2025-10-31T01:18:10.092333216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.098562 env[1202]: time="2025-10-31T01:18:10.098513155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.099850 env[1202]: time="2025-10-31T01:18:10.099815598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.100390 env[1202]: time="2025-10-31T01:18:10.100359017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.101480 env[1202]: time="2025-10-31T01:18:10.101446466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.104185 env[1202]: time="2025-10-31T01:18:10.104156088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.105327 env[1202]: time="2025-10-31T01:18:10.105302137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.106485 env[1202]: time="2025-10-31T01:18:10.106458796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.107899 env[1202]: time="2025-10-31T01:18:10.107873730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.109045 env[1202]: time="2025-10-31T01:18:10.109014198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.110800 env[1202]: time="2025-10-31T01:18:10.110768188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.111901 env[1202]: time="2025-10-31T01:18:10.111850427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:10.127869 env[1202]: time="2025-10-31T01:18:10.127811240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:10.127869 env[1202]: time="2025-10-31T01:18:10.127851245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:10.127869 env[1202]: time="2025-10-31T01:18:10.127861965Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:10.128035 env[1202]: time="2025-10-31T01:18:10.127996016Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e96db3428eb9af4cb02a6206bb28552716b7b2e33eeea7bff7f7b6a172e81810 pid=1646 runtime=io.containerd.runc.v2 Oct 31 01:18:10.141349 env[1202]: time="2025-10-31T01:18:10.141299495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:10.141492 env[1202]: time="2025-10-31T01:18:10.141469043Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:10.141881 env[1202]: time="2025-10-31T01:18:10.141856540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:10.142016 systemd[1]: Started cri-containerd-e96db3428eb9af4cb02a6206bb28552716b7b2e33eeea7bff7f7b6a172e81810.scope. Oct 31 01:18:10.142448 env[1202]: time="2025-10-31T01:18:10.142387455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:10.142493 env[1202]: time="2025-10-31T01:18:10.142456825Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:10.142493 env[1202]: time="2025-10-31T01:18:10.142478326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:10.142619 env[1202]: time="2025-10-31T01:18:10.142585116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f36334814ab69bc1f9d499b299fe971abcf7bebacf0edc03b2296869f71711c9 pid=1682 runtime=io.containerd.runc.v2 Oct 31 01:18:10.143644 env[1202]: time="2025-10-31T01:18:10.143562880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d53d9e88fd7419b7ae5a49d0b61dc017b4759fc0c8e803b5dcd55cc8d9cd68e pid=1668 runtime=io.containerd.runc.v2 Oct 31 01:18:10.152787 systemd[1]: Started cri-containerd-f36334814ab69bc1f9d499b299fe971abcf7bebacf0edc03b2296869f71711c9.scope. Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit: BPF prog-id=58 op=LOAD Oct 31 01:18:10.154000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.154000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366462333432386562396166346362303261363230366262323835 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366462333432386562396166346362303261363230366262323835 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.155000 audit: BPF prog-id=59 op=LOAD Oct 31 01:18:10.155000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003de9d0 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366462333432386562396166346362303261363230366262323835 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.156000 audit: BPF prog-id=60 op=LOAD Oct 31 01:18:10.156000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dea18 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366462333432386562396166346362303261363230366262323835 Oct 31 01:18:10.157000 audit: BPF prog-id=60 op=UNLOAD Oct 31 01:18:10.157000 audit: BPF prog-id=59 op=UNLOAD Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.157000 audit: BPF prog-id=61 op=LOAD Oct 31 01:18:10.157000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dee28 items=0 ppid=1646 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366462333432386562396166346362303261363230366262323835 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit: BPF prog-id=62 op=LOAD Oct 31 01:18:10.163000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1682 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633363333343831346162363962633166396434393962323939666539 Oct 31 01:18:10.163000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.163000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1682 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633363333343831346162363962633166396434393962323939666539 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit: BPF prog-id=63 op=LOAD Oct 31 01:18:10.164000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000238f20 items=0 ppid=1682 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633363333343831346162363962633166396434393962323939666539 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.164000 audit: BPF prog-id=64 op=LOAD Oct 31 01:18:10.164000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000238f68 items=0 ppid=1682 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633363333343831346162363962633166396434393962323939666539 Oct 31 01:18:10.164000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:18:10.164000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:18:10.165671 systemd[1]: Started cri-containerd-2d53d9e88fd7419b7ae5a49d0b61dc017b4759fc0c8e803b5dcd55cc8d9cd68e.scope. Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.166000 audit: BPF prog-id=65 op=LOAD Oct 31 01:18:10.166000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000239378 items=0 ppid=1682 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633363333343831346162363962633166396434393962323939666539 Oct 31 01:18:10.178818 env[1202]: time="2025-10-31T01:18:10.178773923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:612f33402cf5c88e92118ae716d8136a,Namespace:kube-system,Attempt:0,} returns sandbox id \"e96db3428eb9af4cb02a6206bb28552716b7b2e33eeea7bff7f7b6a172e81810\"" Oct 31 01:18:10.179668 kubelet[1604]: E1031 01:18:10.179629 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:10.181718 env[1202]: time="2025-10-31T01:18:10.181690342Z" level=info msg="CreateContainer within sandbox \"e96db3428eb9af4cb02a6206bb28552716b7b2e33eeea7bff7f7b6a172e81810\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.182000 audit: BPF prog-id=66 op=LOAD Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1668 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353364396538386664373431396237616535613439643062363164 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1668 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353364396538386664373431396237616535613439643062363164 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.183000 audit: BPF prog-id=67 op=LOAD Oct 31 01:18:10.183000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00008fb80 items=0 ppid=1668 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353364396538386664373431396237616535613439643062363164 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.184000 audit: BPF prog-id=68 op=LOAD Oct 31 01:18:10.184000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00008fbc8 items=0 ppid=1668 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353364396538386664373431396237616535613439643062363164 Oct 31 01:18:10.185000 audit: BPF prog-id=68 op=UNLOAD Oct 31 01:18:10.185000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.185000 audit: BPF prog-id=69 op=LOAD Oct 31 01:18:10.185000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00008ffd8 items=0 ppid=1668 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353364396538386664373431396237616535613439643062363164 Oct 31 01:18:10.190500 env[1202]: time="2025-10-31T01:18:10.190457654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a1d51be1ff02022474f2598f6e43038f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f36334814ab69bc1f9d499b299fe971abcf7bebacf0edc03b2296869f71711c9\"" Oct 31 01:18:10.191292 kubelet[1604]: E1031 01:18:10.191260 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:10.192616 env[1202]: time="2025-10-31T01:18:10.192591766Z" level=info msg="CreateContainer within sandbox \"f36334814ab69bc1f9d499b299fe971abcf7bebacf0edc03b2296869f71711c9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 31 01:18:10.206639 env[1202]: time="2025-10-31T01:18:10.206542819Z" level=info msg="CreateContainer within sandbox \"e96db3428eb9af4cb02a6206bb28552716b7b2e33eeea7bff7f7b6a172e81810\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cef4a365d390f0311f9fb85f39053f3c10c3b9d0223cdebacd3fc435cb900270\"" Oct 31 01:18:10.210332 env[1202]: time="2025-10-31T01:18:10.210275690Z" level=info msg="StartContainer for \"cef4a365d390f0311f9fb85f39053f3c10c3b9d0223cdebacd3fc435cb900270\"" Oct 31 01:18:10.212454 env[1202]: time="2025-10-31T01:18:10.212378914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4654b122dbb389158fe3c0766e603624,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d53d9e88fd7419b7ae5a49d0b61dc017b4759fc0c8e803b5dcd55cc8d9cd68e\"" Oct 31 01:18:10.212536 env[1202]: time="2025-10-31T01:18:10.212435621Z" level=info msg="CreateContainer within sandbox \"f36334814ab69bc1f9d499b299fe971abcf7bebacf0edc03b2296869f71711c9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c657e5f95c9c865ce51633a1b1d3e1011959b3d018cc9345d22dff95205a9ec1\"" Oct 31 01:18:10.212946 env[1202]: time="2025-10-31T01:18:10.212920199Z" level=info msg="StartContainer for \"c657e5f95c9c865ce51633a1b1d3e1011959b3d018cc9345d22dff95205a9ec1\"" Oct 31 01:18:10.213076 kubelet[1604]: E1031 01:18:10.213056 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:10.214597 env[1202]: time="2025-10-31T01:18:10.214570584Z" level=info msg="CreateContainer within sandbox \"2d53d9e88fd7419b7ae5a49d0b61dc017b4759fc0c8e803b5dcd55cc8d9cd68e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 31 01:18:10.224532 systemd[1]: Started cri-containerd-cef4a365d390f0311f9fb85f39053f3c10c3b9d0223cdebacd3fc435cb900270.scope. Oct 31 01:18:10.226084 env[1202]: time="2025-10-31T01:18:10.226050383Z" level=info msg="CreateContainer within sandbox \"2d53d9e88fd7419b7ae5a49d0b61dc017b4759fc0c8e803b5dcd55cc8d9cd68e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b1eaee90a76cbeb64ce38665fd81ae3734ea2f49150c56a7573b8f470f731414\"" Oct 31 01:18:10.226509 env[1202]: time="2025-10-31T01:18:10.226476723Z" level=info msg="StartContainer for \"b1eaee90a76cbeb64ce38665fd81ae3734ea2f49150c56a7573b8f470f731414\"" Oct 31 01:18:10.231109 systemd[1]: Started cri-containerd-c657e5f95c9c865ce51633a1b1d3e1011959b3d018cc9345d22dff95205a9ec1.scope. Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.236000 audit: BPF prog-id=70 op=LOAD Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1646 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663461333635643339306630333131663966623835663339303533 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1646 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663461333635643339306630333131663966623835663339303533 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit: BPF prog-id=71 op=LOAD Oct 31 01:18:10.237000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025750 items=0 ppid=1646 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663461333635643339306630333131663966623835663339303533 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit: BPF prog-id=72 op=LOAD Oct 31 01:18:10.237000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025798 items=0 ppid=1646 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663461333635643339306630333131663966623835663339303533 Oct 31 01:18:10.237000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:18:10.237000 audit: BPF prog-id=71 op=UNLOAD Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.237000 audit: BPF prog-id=73 op=LOAD Oct 31 01:18:10.237000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025ba8 items=0 ppid=1646 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663461333635643339306630333131663966623835663339303533 Oct 31 01:18:10.239546 kubelet[1604]: W1031 01:18:10.238808 1604 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.142:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.142:6443: connect: connection refused Oct 31 01:18:10.239546 kubelet[1604]: E1031 01:18:10.238896 1604 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.142:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.142:6443: connect: connection refused" logger="UnhandledError" Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit: BPF prog-id=74 op=LOAD Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1682 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353765356639356339633836356365353136333361316231643365 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1682 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353765356639356339633836356365353136333361316231643365 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit: BPF prog-id=75 op=LOAD Oct 31 01:18:10.240000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218540 items=0 ppid=1682 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353765356639356339633836356365353136333361316231643365 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit: BPF prog-id=76 op=LOAD Oct 31 01:18:10.240000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218588 items=0 ppid=1682 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353765356639356339633836356365353136333361316231643365 Oct 31 01:18:10.240000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:18:10.240000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.240000 audit: BPF prog-id=77 op=LOAD Oct 31 01:18:10.240000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218998 items=0 ppid=1682 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353765356639356339633836356365353136333361316231643365 Oct 31 01:18:10.248815 systemd[1]: Started cri-containerd-b1eaee90a76cbeb64ce38665fd81ae3734ea2f49150c56a7573b8f470f731414.scope. Oct 31 01:18:10.265858 env[1202]: time="2025-10-31T01:18:10.265613348Z" level=info msg="StartContainer for \"cef4a365d390f0311f9fb85f39053f3c10c3b9d0223cdebacd3fc435cb900270\" returns successfully" Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit: BPF prog-id=78 op=LOAD Oct 31 01:18:10.267000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.267000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1668 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656165653930613736636265623634636533383636356664383161 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1668 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656165653930613736636265623634636533383636356664383161 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.269000 audit: BPF prog-id=79 op=LOAD Oct 31 01:18:10.269000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000291de0 items=0 ppid=1668 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656165653930613736636265623634636533383636356664383161 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.270000 audit: BPF prog-id=80 op=LOAD Oct 31 01:18:10.270000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000291e28 items=0 ppid=1668 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656165653930613736636265623634636533383636356664383161 Oct 31 01:18:10.271000 audit: BPF prog-id=80 op=UNLOAD Oct 31 01:18:10.271000 audit: BPF prog-id=79 op=UNLOAD Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:10.271000 audit: BPF prog-id=81 op=LOAD Oct 31 01:18:10.271000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000416238 items=0 ppid=1668 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:10.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656165653930613736636265623634636533383636356664383161 Oct 31 01:18:10.272719 env[1202]: time="2025-10-31T01:18:10.272689207Z" level=info msg="StartContainer for \"c657e5f95c9c865ce51633a1b1d3e1011959b3d018cc9345d22dff95205a9ec1\" returns successfully" Oct 31 01:18:10.296646 env[1202]: time="2025-10-31T01:18:10.296601912Z" level=info msg="StartContainer for \"b1eaee90a76cbeb64ce38665fd81ae3734ea2f49150c56a7573b8f470f731414\" returns successfully" Oct 31 01:18:10.402915 kubelet[1604]: I1031 01:18:10.402513 1604 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:18:10.571559 kubelet[1604]: E1031 01:18:10.571470 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:10.571822 kubelet[1604]: E1031 01:18:10.571811 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:10.573122 kubelet[1604]: E1031 01:18:10.573109 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:10.573284 kubelet[1604]: E1031 01:18:10.573263 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:10.574433 kubelet[1604]: E1031 01:18:10.574420 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:10.574574 kubelet[1604]: E1031 01:18:10.574561 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:11.160000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.160000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004a78570 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.160000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.160000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.160000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004a78630 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.160000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.165000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.165000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0038ba080 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.165000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.165000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003885290 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.167000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.167000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00211bec0 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.168000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.168000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c003885a10 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:18:11.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:18:11.221000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.221000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000718f90 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:11.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:11.221000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:11.221000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00071d3a0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:11.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:11.283892 kubelet[1604]: I1031 01:18:11.283853 1604 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Oct 31 01:18:11.284288 kubelet[1604]: E1031 01:18:11.284270 1604 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Oct 31 01:18:11.299190 kubelet[1604]: E1031 01:18:11.299167 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.399678 kubelet[1604]: E1031 01:18:11.399624 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.500459 kubelet[1604]: E1031 01:18:11.500326 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.576010 kubelet[1604]: E1031 01:18:11.575974 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:11.576151 kubelet[1604]: E1031 01:18:11.576036 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:11.576151 kubelet[1604]: E1031 01:18:11.576097 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:11.576151 kubelet[1604]: E1031 01:18:11.576130 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:11.576151 kubelet[1604]: E1031 01:18:11.576098 1604 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:18:11.576277 kubelet[1604]: E1031 01:18:11.576204 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:11.600910 kubelet[1604]: E1031 01:18:11.600875 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.701510 kubelet[1604]: E1031 01:18:11.701480 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.802106 kubelet[1604]: E1031 01:18:11.802032 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:11.902823 kubelet[1604]: E1031 01:18:11.902794 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.003606 kubelet[1604]: E1031 01:18:12.003574 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.104498 kubelet[1604]: E1031 01:18:12.104439 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.204957 kubelet[1604]: E1031 01:18:12.204926 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.305459 kubelet[1604]: E1031 01:18:12.305394 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.406008 kubelet[1604]: E1031 01:18:12.405909 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.506528 kubelet[1604]: E1031 01:18:12.506493 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.607245 kubelet[1604]: E1031 01:18:12.607202 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.707723 kubelet[1604]: E1031 01:18:12.707669 1604 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:18:12.851498 kubelet[1604]: I1031 01:18:12.851474 1604 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:12.857092 kubelet[1604]: I1031 01:18:12.857060 1604 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:12.861248 kubelet[1604]: I1031 01:18:12.861209 1604 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:13.094866 systemd[1]: Reloading. Oct 31 01:18:13.151424 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2025-10-31T01:18:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:18:13.151452 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2025-10-31T01:18:13Z" level=info msg="torcx already run" Oct 31 01:18:13.211232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:18:13.211247 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:18:13.227783 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.295329 kernel: kauditd_printk_skb: 585 callbacks suppressed Oct 31 01:18:13.295392 kernel: audit: type=1400 audit(1761873493.293:550): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.304946 kernel: audit: type=1400 audit(1761873493.293:551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.305054 kernel: audit: type=1400 audit(1761873493.293:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314679 kernel: audit: type=1400 audit(1761873493.293:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319778 kernel: audit: type=1400 audit(1761873493.293:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319825 kernel: audit: type=1400 audit(1761873493.293:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324677 kernel: audit: type=1400 audit(1761873493.293:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324718 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.329594 kernel: audit: type=1400 audit(1761873493.293:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.330993 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:18:13.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.299000 audit: BPF prog-id=82 op=LOAD Oct 31 01:18:13.299000 audit: BPF prog-id=78 op=UNLOAD Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit: BPF prog-id=83 op=LOAD Oct 31 01:18:13.309000 audit: BPF prog-id=43 op=UNLOAD Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit: BPF prog-id=84 op=LOAD Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit: BPF prog-id=85 op=LOAD Oct 31 01:18:13.314000 audit: BPF prog-id=44 op=UNLOAD Oct 31 01:18:13.314000 audit: BPF prog-id=45 op=UNLOAD Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit: BPF prog-id=86 op=LOAD Oct 31 01:18:13.319000 audit: BPF prog-id=62 op=UNLOAD Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324000 audit: BPF prog-id=87 op=LOAD Oct 31 01:18:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit: BPF prog-id=46 op=UNLOAD Oct 31 01:18:13.337000 audit: BPF prog-id=47 op=UNLOAD Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.337000 audit: BPF prog-id=89 op=LOAD Oct 31 01:18:13.337000 audit: BPF prog-id=66 op=UNLOAD Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.338000 audit: BPF prog-id=90 op=LOAD Oct 31 01:18:13.338000 audit: BPF prog-id=58 op=UNLOAD Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.339000 audit: BPF prog-id=91 op=LOAD Oct 31 01:18:13.339000 audit: BPF prog-id=48 op=UNLOAD Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit: BPF prog-id=92 op=LOAD Oct 31 01:18:13.340000 audit: BPF prog-id=70 op=UNLOAD Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit: BPF prog-id=93 op=LOAD Oct 31 01:18:13.341000 audit: BPF prog-id=74 op=UNLOAD Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit: BPF prog-id=94 op=LOAD Oct 31 01:18:13.341000 audit: BPF prog-id=49 op=UNLOAD Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit: BPF prog-id=95 op=LOAD Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.341000 audit: BPF prog-id=96 op=LOAD Oct 31 01:18:13.341000 audit: BPF prog-id=50 op=UNLOAD Oct 31 01:18:13.341000 audit: BPF prog-id=51 op=UNLOAD Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.343000 audit: BPF prog-id=97 op=LOAD Oct 31 01:18:13.343000 audit: BPF prog-id=52 op=UNLOAD Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.344000 audit: BPF prog-id=98 op=LOAD Oct 31 01:18:13.344000 audit: BPF prog-id=53 op=UNLOAD Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit: BPF prog-id=99 op=LOAD Oct 31 01:18:13.345000 audit: BPF prog-id=54 op=UNLOAD Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit: BPF prog-id=100 op=LOAD Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.345000 audit: BPF prog-id=101 op=LOAD Oct 31 01:18:13.345000 audit: BPF prog-id=55 op=UNLOAD Oct 31 01:18:13.345000 audit: BPF prog-id=56 op=UNLOAD Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.346000 audit: BPF prog-id=102 op=LOAD Oct 31 01:18:13.346000 audit: BPF prog-id=57 op=UNLOAD Oct 31 01:18:13.357514 systemd[1]: Stopping kubelet.service... Oct 31 01:18:13.380618 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:18:13.380770 systemd[1]: Stopped kubelet.service. Oct 31 01:18:13.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:13.382163 systemd[1]: Starting kubelet.service... Oct 31 01:18:13.465110 systemd[1]: Started kubelet.service. Oct 31 01:18:13.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:13.499560 kubelet[1938]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:13.499560 kubelet[1938]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:18:13.499560 kubelet[1938]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:13.499560 kubelet[1938]: I1031 01:18:13.499474 1938 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:18:13.506445 kubelet[1938]: I1031 01:18:13.506416 1938 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 01:18:13.506527 kubelet[1938]: I1031 01:18:13.506514 1938 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:18:13.506863 kubelet[1938]: I1031 01:18:13.506848 1938 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 01:18:13.507997 kubelet[1938]: I1031 01:18:13.507982 1938 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 31 01:18:13.510148 kubelet[1938]: I1031 01:18:13.510116 1938 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:18:13.513196 kubelet[1938]: E1031 01:18:13.513156 1938 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:18:13.513272 kubelet[1938]: I1031 01:18:13.513255 1938 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:18:13.516669 kubelet[1938]: I1031 01:18:13.516654 1938 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:18:13.516924 kubelet[1938]: I1031 01:18:13.516902 1938 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:18:13.517323 kubelet[1938]: I1031 01:18:13.516987 1938 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:18:13.517443 kubelet[1938]: I1031 01:18:13.517336 1938 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:18:13.517443 kubelet[1938]: I1031 01:18:13.517349 1938 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 01:18:13.517443 kubelet[1938]: I1031 01:18:13.517398 1938 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:13.517608 kubelet[1938]: I1031 01:18:13.517587 1938 kubelet.go:446] "Attempting to sync node with API server" Oct 31 01:18:13.517707 kubelet[1938]: I1031 01:18:13.517614 1938 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:18:13.517996 kubelet[1938]: I1031 01:18:13.517969 1938 kubelet.go:352] "Adding apiserver pod source" Oct 31 01:18:13.517996 kubelet[1938]: I1031 01:18:13.517996 1938 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:18:13.518774 kubelet[1938]: I1031 01:18:13.518724 1938 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:18:13.519271 kubelet[1938]: I1031 01:18:13.519243 1938 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 01:18:13.519972 kubelet[1938]: I1031 01:18:13.519949 1938 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:18:13.520025 kubelet[1938]: I1031 01:18:13.520011 1938 server.go:1287] "Started kubelet" Oct 31 01:18:13.520304 kubelet[1938]: I1031 01:18:13.520284 1938 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:18:13.520642 kubelet[1938]: I1031 01:18:13.520561 1938 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:18:13.520998 kubelet[1938]: I1031 01:18:13.520970 1938 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:18:13.522249 kubelet[1938]: I1031 01:18:13.522238 1938 server.go:479] "Adding debug handlers to kubelet server" Oct 31 01:18:13.522000 audit[1938]: AVC avc: denied { mac_admin } for pid=1938 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.522000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:13.522000 audit[1938]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003b5e90 a1=c00092f848 a2=c0003b5e30 a3=25 items=0 ppid=1 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:13.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:13.522000 audit[1938]: AVC avc: denied { mac_admin } for pid=1938 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.522000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:13.522000 audit[1938]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009b2540 a1=c00092f860 a2=c0003b5fb0 a3=25 items=0 ppid=1 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:13.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:13.525568 kubelet[1938]: I1031 01:18:13.523215 1938 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:18:13.525568 kubelet[1938]: I1031 01:18:13.523260 1938 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:18:13.525568 kubelet[1938]: I1031 01:18:13.523293 1938 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:18:13.525568 kubelet[1938]: I1031 01:18:13.523802 1938 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:18:13.528612 kubelet[1938]: E1031 01:18:13.528591 1938 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:18:13.530629 kubelet[1938]: I1031 01:18:13.530470 1938 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:18:13.530629 kubelet[1938]: I1031 01:18:13.530599 1938 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:18:13.530731 kubelet[1938]: I1031 01:18:13.530707 1938 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:18:13.531404 kubelet[1938]: I1031 01:18:13.531366 1938 factory.go:221] Registration of the systemd container factory successfully Oct 31 01:18:13.531488 kubelet[1938]: I1031 01:18:13.531462 1938 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:18:13.532789 kubelet[1938]: I1031 01:18:13.532765 1938 factory.go:221] Registration of the containerd container factory successfully Oct 31 01:18:13.535737 kubelet[1938]: I1031 01:18:13.535716 1938 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 01:18:13.536504 kubelet[1938]: I1031 01:18:13.536491 1938 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 01:18:13.536590 kubelet[1938]: I1031 01:18:13.536576 1938 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 01:18:13.536676 kubelet[1938]: I1031 01:18:13.536661 1938 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:18:13.536744 kubelet[1938]: I1031 01:18:13.536731 1938 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 01:18:13.536864 kubelet[1938]: E1031 01:18:13.536846 1938 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 01:18:13.558559 kubelet[1938]: I1031 01:18:13.558529 1938 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:18:13.558559 kubelet[1938]: I1031 01:18:13.558545 1938 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:18:13.558559 kubelet[1938]: I1031 01:18:13.558559 1938 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:13.558706 kubelet[1938]: I1031 01:18:13.558681 1938 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 31 01:18:13.558734 kubelet[1938]: I1031 01:18:13.558696 1938 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 31 01:18:13.558734 kubelet[1938]: I1031 01:18:13.558719 1938 policy_none.go:49] "None policy: Start" Oct 31 01:18:13.558734 kubelet[1938]: I1031 01:18:13.558726 1938 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:18:13.558734 kubelet[1938]: I1031 01:18:13.558734 1938 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:18:13.558837 kubelet[1938]: I1031 01:18:13.558825 1938 state_mem.go:75] "Updated machine memory state" Oct 31 01:18:13.561707 kubelet[1938]: I1031 01:18:13.561684 1938 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 01:18:13.561000 audit[1938]: AVC avc: denied { mac_admin } for pid=1938 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:13.561000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:13.561000 audit[1938]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c64360 a1=c000b2e630 a2=c000c64330 a3=25 items=0 ppid=1 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:13.561000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:13.561912 kubelet[1938]: I1031 01:18:13.561737 1938 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 01:18:13.561912 kubelet[1938]: I1031 01:18:13.561833 1938 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:18:13.561912 kubelet[1938]: I1031 01:18:13.561842 1938 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:18:13.562492 kubelet[1938]: I1031 01:18:13.562322 1938 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:18:13.563296 kubelet[1938]: E1031 01:18:13.563272 1938 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:18:13.638994 kubelet[1938]: I1031 01:18:13.638344 1938 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:13.638994 kubelet[1938]: I1031 01:18:13.638480 1938 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:13.638994 kubelet[1938]: I1031 01:18:13.638590 1938 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.644188 kubelet[1938]: E1031 01:18:13.644160 1938 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:13.644656 kubelet[1938]: E1031 01:18:13.644612 1938 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:13.644865 kubelet[1938]: E1031 01:18:13.644725 1938 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.666469 kubelet[1938]: I1031 01:18:13.666451 1938 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:18:13.672071 kubelet[1938]: I1031 01:18:13.672038 1938 kubelet_node_status.go:124] "Node was previously registered" node="localhost" Oct 31 01:18:13.672118 kubelet[1938]: I1031 01:18:13.672094 1938 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Oct 31 01:18:13.831770 kubelet[1938]: I1031 01:18:13.831733 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:13.831770 kubelet[1938]: I1031 01:18:13.831761 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a1d51be1ff02022474f2598f6e43038f-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a1d51be1ff02022474f2598f6e43038f\") " pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:13.831871 kubelet[1938]: I1031 01:18:13.831779 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:13.831871 kubelet[1938]: I1031 01:18:13.831796 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/612f33402cf5c88e92118ae716d8136a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"612f33402cf5c88e92118ae716d8136a\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:13.831871 kubelet[1938]: I1031 01:18:13.831815 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.831871 kubelet[1938]: I1031 01:18:13.831828 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.831871 kubelet[1938]: I1031 01:18:13.831843 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.831982 kubelet[1938]: I1031 01:18:13.831856 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.831982 kubelet[1938]: I1031 01:18:13.831872 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4654b122dbb389158fe3c0766e603624-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4654b122dbb389158fe3c0766e603624\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:18:13.944463 kubelet[1938]: E1031 01:18:13.944437 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:13.945660 kubelet[1938]: E1031 01:18:13.945625 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:13.945745 kubelet[1938]: E1031 01:18:13.945721 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:14.519106 kubelet[1938]: I1031 01:18:14.519059 1938 apiserver.go:52] "Watching apiserver" Oct 31 01:18:14.531314 kubelet[1938]: I1031 01:18:14.531279 1938 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:18:14.547729 kubelet[1938]: I1031 01:18:14.547705 1938 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:14.548052 kubelet[1938]: I1031 01:18:14.548019 1938 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:14.548224 kubelet[1938]: E1031 01:18:14.548071 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:14.553725 kubelet[1938]: E1031 01:18:14.553703 1938 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 31 01:18:14.553819 kubelet[1938]: E1031 01:18:14.553800 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:14.553879 kubelet[1938]: E1031 01:18:14.553852 1938 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 31 01:18:14.553944 kubelet[1938]: E1031 01:18:14.553921 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:14.566376 kubelet[1938]: I1031 01:18:14.566305 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.5662880279999998 podStartE2EDuration="2.566288028s" podCreationTimestamp="2025-10-31 01:18:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:14.56616098 +0000 UTC m=+1.097600514" watchObservedRunningTime="2025-10-31 01:18:14.566288028 +0000 UTC m=+1.097727562" Oct 31 01:18:14.578339 kubelet[1938]: I1031 01:18:14.578290 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.578281901 podStartE2EDuration="2.578281901s" podCreationTimestamp="2025-10-31 01:18:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:14.571425863 +0000 UTC m=+1.102865397" watchObservedRunningTime="2025-10-31 01:18:14.578281901 +0000 UTC m=+1.109721435" Oct 31 01:18:14.578523 kubelet[1938]: I1031 01:18:14.578365 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.5783608190000002 podStartE2EDuration="2.578360819s" podCreationTimestamp="2025-10-31 01:18:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:14.578149532 +0000 UTC m=+1.109589077" watchObservedRunningTime="2025-10-31 01:18:14.578360819 +0000 UTC m=+1.109800353" Oct 31 01:18:15.355000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 01:18:15.355000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a1e780 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:15.355000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:15.549275 kubelet[1938]: E1031 01:18:15.549231 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:15.549587 kubelet[1938]: E1031 01:18:15.549431 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:15.549644 kubelet[1938]: E1031 01:18:15.549628 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:16.549888 kubelet[1938]: E1031 01:18:16.549845 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:18.499000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.501852 kernel: kauditd_printk_skb: 261 callbacks suppressed Oct 31 01:18:18.501908 kernel: audit: type=1400 audit(1761873498.499:795): avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.499000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003a01e0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.517932 kernel: audit: type=1300 audit(1761873498.499:795): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003a01e0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.517975 kernel: audit: type=1327 audit(1761873498.499:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.500000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.532365 kernel: audit: type=1400 audit(1761873498.500:796): avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.532405 kernel: audit: type=1300 audit(1761873498.500:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a6e5c0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.500000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a6e5c0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.549223 kernel: audit: type=1327 audit(1761873498.500:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.549279 kernel: audit: type=1400 audit(1761873498.500:797): avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.500000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.500000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a6e640 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.565220 kernel: audit: type=1300 audit(1761873498.500:797): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a6e640 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.565261 kernel: audit: type=1327 audit(1761873498.500:797): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:18.500000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.579602 kernel: audit: type=1400 audit(1761873498.500:798): avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:18:18.500000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001927b40 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:18:18.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:18:19.371371 kubelet[1938]: I1031 01:18:19.371328 1938 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 31 01:18:19.371739 env[1202]: time="2025-10-31T01:18:19.371693560Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:18:19.371942 kubelet[1938]: I1031 01:18:19.371911 1938 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 31 01:18:20.409828 systemd[1]: Created slice kubepods-besteffort-pod9623e448_1435_4c3a_a8ca_ba7e37082cc0.slice. Oct 31 01:18:20.470621 kubelet[1938]: I1031 01:18:20.470595 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9623e448-1435-4c3a-a8ca-ba7e37082cc0-lib-modules\") pod \"kube-proxy-m2jp6\" (UID: \"9623e448-1435-4c3a-a8ca-ba7e37082cc0\") " pod="kube-system/kube-proxy-m2jp6" Oct 31 01:18:20.470832 kubelet[1938]: I1031 01:18:20.470626 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7mmd\" (UniqueName: \"kubernetes.io/projected/9623e448-1435-4c3a-a8ca-ba7e37082cc0-kube-api-access-z7mmd\") pod \"kube-proxy-m2jp6\" (UID: \"9623e448-1435-4c3a-a8ca-ba7e37082cc0\") " pod="kube-system/kube-proxy-m2jp6" Oct 31 01:18:20.470832 kubelet[1938]: I1031 01:18:20.470646 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9623e448-1435-4c3a-a8ca-ba7e37082cc0-kube-proxy\") pod \"kube-proxy-m2jp6\" (UID: \"9623e448-1435-4c3a-a8ca-ba7e37082cc0\") " pod="kube-system/kube-proxy-m2jp6" Oct 31 01:18:20.470832 kubelet[1938]: I1031 01:18:20.470659 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9623e448-1435-4c3a-a8ca-ba7e37082cc0-xtables-lock\") pod \"kube-proxy-m2jp6\" (UID: \"9623e448-1435-4c3a-a8ca-ba7e37082cc0\") " pod="kube-system/kube-proxy-m2jp6" Oct 31 01:18:20.520310 systemd[1]: Created slice kubepods-besteffort-pod1e79b8ea_94e8_4db5_bc94_fbd15664a7b7.slice. Oct 31 01:18:20.571606 kubelet[1938]: I1031 01:18:20.571562 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brxkd\" (UniqueName: \"kubernetes.io/projected/1e79b8ea-94e8-4db5-bc94-fbd15664a7b7-kube-api-access-brxkd\") pod \"tigera-operator-7dcd859c48-knls2\" (UID: \"1e79b8ea-94e8-4db5-bc94-fbd15664a7b7\") " pod="tigera-operator/tigera-operator-7dcd859c48-knls2" Oct 31 01:18:20.571606 kubelet[1938]: I1031 01:18:20.571610 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e79b8ea-94e8-4db5-bc94-fbd15664a7b7-var-lib-calico\") pod \"tigera-operator-7dcd859c48-knls2\" (UID: \"1e79b8ea-94e8-4db5-bc94-fbd15664a7b7\") " pod="tigera-operator/tigera-operator-7dcd859c48-knls2" Oct 31 01:18:20.575599 kubelet[1938]: I1031 01:18:20.575580 1938 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:18:20.717037 kubelet[1938]: E1031 01:18:20.716993 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:20.717590 env[1202]: time="2025-10-31T01:18:20.717532767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-m2jp6,Uid:9623e448-1435-4c3a-a8ca-ba7e37082cc0,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:20.732445 env[1202]: time="2025-10-31T01:18:20.732367109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:20.732445 env[1202]: time="2025-10-31T01:18:20.732405553Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:20.732553 env[1202]: time="2025-10-31T01:18:20.732442022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:20.732626 env[1202]: time="2025-10-31T01:18:20.732563135Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4c9ab784354b0ca90697f1d496813435259a654189071801a4e9296d65d0d37 pid=1993 runtime=io.containerd.runc.v2 Oct 31 01:18:20.743482 systemd[1]: Started cri-containerd-e4c9ab784354b0ca90697f1d496813435259a654189071801a4e9296d65d0d37.scope. Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit: BPF prog-id=103 op=LOAD Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633961623738343335346230636139303639376631643439363831 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633961623738343335346230636139303639376631643439363831 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit: BPF prog-id=104 op=LOAD Oct 31 01:18:20.751000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002830c0 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633961623738343335346230636139303639376631643439363831 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.751000 audit: BPF prog-id=105 op=LOAD Oct 31 01:18:20.751000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000283108 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633961623738343335346230636139303639376631643439363831 Oct 31 01:18:20.751000 audit: BPF prog-id=105 op=UNLOAD Oct 31 01:18:20.752000 audit: BPF prog-id=104 op=UNLOAD Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.752000 audit: BPF prog-id=106 op=LOAD Oct 31 01:18:20.752000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000283518 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633961623738343335346230636139303639376631643439363831 Oct 31 01:18:20.763077 env[1202]: time="2025-10-31T01:18:20.762968892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-m2jp6,Uid:9623e448-1435-4c3a-a8ca-ba7e37082cc0,Namespace:kube-system,Attempt:0,} returns sandbox id \"e4c9ab784354b0ca90697f1d496813435259a654189071801a4e9296d65d0d37\"" Oct 31 01:18:20.765384 kubelet[1938]: E1031 01:18:20.765351 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:20.767780 env[1202]: time="2025-10-31T01:18:20.767737077Z" level=info msg="CreateContainer within sandbox \"e4c9ab784354b0ca90697f1d496813435259a654189071801a4e9296d65d0d37\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:18:20.784170 env[1202]: time="2025-10-31T01:18:20.784118108Z" level=info msg="CreateContainer within sandbox \"e4c9ab784354b0ca90697f1d496813435259a654189071801a4e9296d65d0d37\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d5ba7c89190cefef873cf1e016268ed23abea589657ead3ad8f7136c3ff1b7e4\"" Oct 31 01:18:20.784575 env[1202]: time="2025-10-31T01:18:20.784547402Z" level=info msg="StartContainer for \"d5ba7c89190cefef873cf1e016268ed23abea589657ead3ad8f7136c3ff1b7e4\"" Oct 31 01:18:20.798290 systemd[1]: Started cri-containerd-d5ba7c89190cefef873cf1e016268ed23abea589657ead3ad8f7136c3ff1b7e4.scope. Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f160c5f3298 items=0 ppid=1993 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626137633839313930636566656638373363663165303136323638 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit: BPF prog-id=107 op=LOAD Oct 31 01:18:20.809000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001edec8 items=0 ppid=1993 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626137633839313930636566656638373363663165303136323638 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.809000 audit: BPF prog-id=108 op=LOAD Oct 31 01:18:20.809000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001edf18 items=0 ppid=1993 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626137633839313930636566656638373363663165303136323638 Oct 31 01:18:20.810000 audit: BPF prog-id=108 op=UNLOAD Oct 31 01:18:20.810000 audit: BPF prog-id=107 op=UNLOAD Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.810000 audit: BPF prog-id=109 op=LOAD Oct 31 01:18:20.810000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001edfa8 items=0 ppid=1993 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626137633839313930636566656638373363663165303136323638 Oct 31 01:18:20.822453 env[1202]: time="2025-10-31T01:18:20.822394255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-knls2,Uid:1e79b8ea-94e8-4db5-bc94-fbd15664a7b7,Namespace:tigera-operator,Attempt:0,}" Oct 31 01:18:20.823983 env[1202]: time="2025-10-31T01:18:20.823931327Z" level=info msg="StartContainer for \"d5ba7c89190cefef873cf1e016268ed23abea589657ead3ad8f7136c3ff1b7e4\" returns successfully" Oct 31 01:18:20.838091 env[1202]: time="2025-10-31T01:18:20.837942728Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:20.838091 env[1202]: time="2025-10-31T01:18:20.837977504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:20.838091 env[1202]: time="2025-10-31T01:18:20.837986572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:20.838241 env[1202]: time="2025-10-31T01:18:20.838099779Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65c3b91859be598b611eb4f89ccaf2c5d6077cae98e974eafe9514ded363f499 pid=2069 runtime=io.containerd.runc.v2 Oct 31 01:18:20.847486 systemd[1]: Started cri-containerd-65c3b91859be598b611eb4f89ccaf2c5d6077cae98e974eafe9514ded363f499.scope. Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit: BPF prog-id=110 op=LOAD Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2069 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633362393138353962653539386236313165623466383963636166 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2069 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633362393138353962653539386236313165623466383963636166 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit: BPF prog-id=111 op=LOAD Oct 31 01:18:20.858000 audit[2080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f1d80 items=0 ppid=2069 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633362393138353962653539386236313165623466383963636166 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit: BPF prog-id=112 op=LOAD Oct 31 01:18:20.858000 audit[2080]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f1dc8 items=0 ppid=2069 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633362393138353962653539386236313165623466383963636166 Oct 31 01:18:20.858000 audit: BPF prog-id=112 op=UNLOAD Oct 31 01:18:20.858000 audit: BPF prog-id=111 op=UNLOAD Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:20.858000 audit: BPF prog-id=113 op=LOAD Oct 31 01:18:20.858000 audit[2080]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e41d8 items=0 ppid=2069 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633362393138353962653539386236313165623466383963636166 Oct 31 01:18:20.880739 env[1202]: time="2025-10-31T01:18:20.880693276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-knls2,Uid:1e79b8ea-94e8-4db5-bc94-fbd15664a7b7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"65c3b91859be598b611eb4f89ccaf2c5d6077cae98e974eafe9514ded363f499\"" Oct 31 01:18:20.882457 env[1202]: time="2025-10-31T01:18:20.882406385Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 31 01:18:20.908000 audit[2135]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:20.908000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3cc84e50 a2=0 a3=7ffc3cc84e3c items=0 ppid=2045 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:18:20.908000 audit[2136]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:20.908000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2bd3e230 a2=0 a3=c6cc3b5cfe6a9efc items=0 ppid=2045 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:18:20.909000 audit[2138]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:20.909000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcb046a50 a2=0 a3=7ffdcb046a3c items=0 ppid=2045 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.910000 audit[2137]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:20.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:18:20.910000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8ca02c90 a2=0 a3=7ffe8ca02c7c items=0 ppid=2045 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:18:20.911000 audit[2140]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:20.911000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd43ef38d0 a2=0 a3=7ffd43ef38bc items=0 ppid=2045 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:18:20.912000 audit[2141]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:20.912000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd7e0e440 a2=0 a3=7ffdd7e0e42c items=0 ppid=2045 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:20.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:18:20.958738 kubelet[1938]: E1031 01:18:20.958706 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:21.011000 audit[2142]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.011000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeabf02840 a2=0 a3=7ffeabf0282c items=0 ppid=2045 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:18:21.014000 audit[2144]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.014000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe9b281ba0 a2=0 a3=7ffe9b281b8c items=0 ppid=2045 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 01:18:21.018000 audit[2147]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.018000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe86c20c30 a2=0 a3=7ffe86c20c1c items=0 ppid=2045 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 01:18:21.019000 audit[2148]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.019000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc39127d50 a2=0 a3=7ffc39127d3c items=0 ppid=2045 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:18:21.021000 audit[2150]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.021000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc0298b70 a2=0 a3=7ffdc0298b5c items=0 ppid=2045 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:18:21.021000 audit[2151]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.021000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc740b7d90 a2=0 a3=7ffc740b7d7c items=0 ppid=2045 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:18:21.024000 audit[2153]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.024000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec3cba950 a2=0 a3=7ffec3cba93c items=0 ppid=2045 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:18:21.026000 audit[2156]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.026000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7a418620 a2=0 a3=7ffc7a41860c items=0 ppid=2045 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 01:18:21.027000 audit[2157]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.027000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd10699660 a2=0 a3=7ffd1069964c items=0 ppid=2045 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:18:21.029000 audit[2159]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.029000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff43bbe640 a2=0 a3=7fff43bbe62c items=0 ppid=2045 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:18:21.030000 audit[2160]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.030000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6557f030 a2=0 a3=7ffc6557f01c items=0 ppid=2045 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:18:21.031000 audit[2162]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.031000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe79803700 a2=0 a3=7ffe798036ec items=0 ppid=2045 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:21.034000 audit[2165]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.034000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcded35600 a2=0 a3=7ffcded355ec items=0 ppid=2045 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:21.038258 kubelet[1938]: E1031 01:18:21.038235 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:21.037000 audit[2168]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.037000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc539c1c70 a2=0 a3=7ffc539c1c5c items=0 ppid=2045 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:18:21.038000 audit[2169]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.038000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe37eb8140 a2=0 a3=7ffe37eb812c items=0 ppid=2045 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:18:21.041000 audit[2171]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.041000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef0470090 a2=0 a3=7ffef047007c items=0 ppid=2045 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:21.044000 audit[2174]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.044000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe54f87c30 a2=0 a3=7ffe54f87c1c items=0 ppid=2045 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:21.045000 audit[2175]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.045000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe0d5dd20 a2=0 a3=7fffe0d5dd0c items=0 ppid=2045 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:18:21.047000 audit[2177]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:21.047000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe5572bfb0 a2=0 a3=7ffe5572bf9c items=0 ppid=2045 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:18:21.067000 audit[2183]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:21.067000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd9ea84870 a2=0 a3=7ffd9ea8485c items=0 ppid=2045 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:21.076000 audit[2183]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:21.076000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd9ea84870 a2=0 a3=7ffd9ea8485c items=0 ppid=2045 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:21.079000 audit[2188]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.079000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd05129e30 a2=0 a3=7ffd05129e1c items=0 ppid=2045 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:18:21.081000 audit[2190]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.081000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda63836e0 a2=0 a3=7ffda63836cc items=0 ppid=2045 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 01:18:21.084000 audit[2193]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.084000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3334f880 a2=0 a3=7ffd3334f86c items=0 ppid=2045 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 01:18:21.084000 audit[2194]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.084000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff56409ea0 a2=0 a3=7fff56409e8c items=0 ppid=2045 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:18:21.086000 audit[2196]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.086000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcffee8f00 a2=0 a3=7ffcffee8eec items=0 ppid=2045 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:18:21.087000 audit[2197]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.087000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff18a7b1c0 a2=0 a3=7fff18a7b1ac items=0 ppid=2045 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:18:21.089000 audit[2199]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.089000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5d572d80 a2=0 a3=7ffe5d572d6c items=0 ppid=2045 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 01:18:21.092000 audit[2202]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.092000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdf34ed600 a2=0 a3=7ffdf34ed5ec items=0 ppid=2045 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:18:21.092000 audit[2203]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.092000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4819db00 a2=0 a3=7ffe4819daec items=0 ppid=2045 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:18:21.094000 audit[2205]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.094000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe73f7a890 a2=0 a3=7ffe73f7a87c items=0 ppid=2045 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:18:21.095000 audit[2206]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.095000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1cdcb650 a2=0 a3=7fff1cdcb63c items=0 ppid=2045 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:18:21.097000 audit[2208]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.097000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd03608640 a2=0 a3=7ffd0360862c items=0 ppid=2045 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:21.100000 audit[2211]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.100000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddf21f210 a2=0 a3=7ffddf21f1fc items=0 ppid=2045 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:18:21.103000 audit[2214]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.103000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff400e6330 a2=0 a3=7fff400e631c items=0 ppid=2045 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 01:18:21.103000 audit[2215]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.103000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff77d59270 a2=0 a3=7fff77d5925c items=0 ppid=2045 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:18:21.105000 audit[2217]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.105000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc163afd70 a2=0 a3=7ffc163afd5c items=0 ppid=2045 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:21.108000 audit[2220]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.108000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc69eea8d0 a2=0 a3=7ffc69eea8bc items=0 ppid=2045 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:21.108000 audit[2221]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.108000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe42f71e0 a2=0 a3=7fffe42f71cc items=0 ppid=2045 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:18:21.110000 audit[2223]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.110000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd5a2b1e30 a2=0 a3=7ffd5a2b1e1c items=0 ppid=2045 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:18:21.111000 audit[2224]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.111000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb4bcc410 a2=0 a3=7ffeb4bcc3fc items=0 ppid=2045 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:18:21.113000 audit[2226]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.113000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe76b94690 a2=0 a3=7ffe76b9467c items=0 ppid=2045 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:21.115000 audit[2229]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:21.115000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe601ca060 a2=0 a3=7ffe601ca04c items=0 ppid=2045 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:21.118000 audit[2231]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:18:21.118000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdd2e0b500 a2=0 a3=7ffdd2e0b4ec items=0 ppid=2045 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:21.118000 audit[2231]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:18:21.118000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd2e0b500 a2=0 a3=7ffdd2e0b4ec items=0 ppid=2045 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:21.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:21.558536 kubelet[1938]: E1031 01:18:21.558503 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:21.559721 kubelet[1938]: E1031 01:18:21.558587 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:21.559944 kubelet[1938]: E1031 01:18:21.559927 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:21.566995 kubelet[1938]: I1031 01:18:21.566943 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-m2jp6" podStartSLOduration=1.566926126 podStartE2EDuration="1.566926126s" podCreationTimestamp="2025-10-31 01:18:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:21.566635198 +0000 UTC m=+8.098074732" watchObservedRunningTime="2025-10-31 01:18:21.566926126 +0000 UTC m=+8.098365660" Oct 31 01:18:21.928822 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3992449782.mount: Deactivated successfully. Oct 31 01:18:22.560074 kubelet[1938]: E1031 01:18:22.560017 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:22.560573 kubelet[1938]: E1031 01:18:22.560444 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:22.857721 env[1202]: time="2025-10-31T01:18:22.857615257Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:22.859729 env[1202]: time="2025-10-31T01:18:22.859690862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:22.861391 env[1202]: time="2025-10-31T01:18:22.861360568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:22.862763 env[1202]: time="2025-10-31T01:18:22.862721785Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:22.863230 env[1202]: time="2025-10-31T01:18:22.863202044Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 31 01:18:22.865313 env[1202]: time="2025-10-31T01:18:22.865272558Z" level=info msg="CreateContainer within sandbox \"65c3b91859be598b611eb4f89ccaf2c5d6077cae98e974eafe9514ded363f499\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 31 01:18:22.884715 env[1202]: time="2025-10-31T01:18:22.884666358Z" level=info msg="CreateContainer within sandbox \"65c3b91859be598b611eb4f89ccaf2c5d6077cae98e974eafe9514ded363f499\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5c237ad8a5600512d115b43171eefe2cb6ca7fbd43922c11e82921875a339499\"" Oct 31 01:18:22.885156 env[1202]: time="2025-10-31T01:18:22.885121169Z" level=info msg="StartContainer for \"5c237ad8a5600512d115b43171eefe2cb6ca7fbd43922c11e82921875a339499\"" Oct 31 01:18:22.899734 systemd[1]: Started cri-containerd-5c237ad8a5600512d115b43171eefe2cb6ca7fbd43922c11e82921875a339499.scope. Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.908000 audit: BPF prog-id=114 op=LOAD Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2069 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563323337616438613536303035313264313135623433313731656566 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2069 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563323337616438613536303035313264313135623433313731656566 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit: BPF prog-id=115 op=LOAD Oct 31 01:18:22.909000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000316c20 items=0 ppid=2069 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563323337616438613536303035313264313135623433313731656566 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit: BPF prog-id=116 op=LOAD Oct 31 01:18:22.909000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000316c68 items=0 ppid=2069 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563323337616438613536303035313264313135623433313731656566 Oct 31 01:18:22.909000 audit: BPF prog-id=116 op=UNLOAD Oct 31 01:18:22.909000 audit: BPF prog-id=115 op=UNLOAD Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:22.909000 audit: BPF prog-id=117 op=LOAD Oct 31 01:18:22.909000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000317078 items=0 ppid=2069 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563323337616438613536303035313264313135623433313731656566 Oct 31 01:18:22.922556 env[1202]: time="2025-10-31T01:18:22.922515011Z" level=info msg="StartContainer for \"5c237ad8a5600512d115b43171eefe2cb6ca7fbd43922c11e82921875a339499\" returns successfully" Oct 31 01:18:23.569677 kubelet[1938]: I1031 01:18:23.569605 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-knls2" podStartSLOduration=1.5874484610000001 podStartE2EDuration="3.569587694s" podCreationTimestamp="2025-10-31 01:18:20 +0000 UTC" firstStartedPulling="2025-10-31 01:18:20.881998712 +0000 UTC m=+7.413438246" lastFinishedPulling="2025-10-31 01:18:22.864137945 +0000 UTC m=+9.395577479" observedRunningTime="2025-10-31 01:18:23.569288943 +0000 UTC m=+10.100728477" watchObservedRunningTime="2025-10-31 01:18:23.569587694 +0000 UTC m=+10.101027248" Oct 31 01:18:25.043108 kubelet[1938]: E1031 01:18:25.043068 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:28.183000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.184942 sudo[1341]: pam_unix(sudo:session): session closed for user root Oct 31 01:18:28.190530 kernel: kauditd_printk_skb: 369 callbacks suppressed Oct 31 01:18:28.190663 kernel: audit: type=1106 audit(1761873508.183:910): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.183000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.198511 kernel: audit: type=1104 audit(1761873508.183:911): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.199270 sshd[1338]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:28.198000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:28.201528 systemd[1]: sshd@6-10.0.0.142:22-10.0.0.1:59494.service: Deactivated successfully. Oct 31 01:18:28.202594 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:18:28.202707 systemd[1]: session-7.scope: Consumed 3.448s CPU time. Oct 31 01:18:28.203255 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:18:28.208586 kernel: audit: type=1106 audit(1761873508.198:912): pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:28.204029 systemd-logind[1193]: Removed session 7. Oct 31 01:18:28.198000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:28.222898 kernel: audit: type=1104 audit(1761873508.198:913): pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:28.222949 kernel: audit: type=1131 audit(1761873508.200:914): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:59494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:59494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:28.421000 audit[2327]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.427485 kernel: audit: type=1325 audit(1761873508.421:915): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.421000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa1a00890 a2=0 a3=7fffa1a0087c items=0 ppid=2045 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.436429 kernel: audit: type=1300 audit(1761873508.421:915): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa1a00890 a2=0 a3=7fffa1a0087c items=0 ppid=2045 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:28.445085 kernel: audit: type=1327 audit(1761873508.421:915): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:28.445126 kernel: audit: type=1325 audit(1761873508.435:916): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.435000 audit[2327]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.435000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa1a00890 a2=0 a3=0 items=0 ppid=2045 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.453439 kernel: audit: type=1300 audit(1761873508.435:916): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa1a00890 a2=0 a3=0 items=0 ppid=2045 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:28.464000 audit[2329]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.464000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc09f34ac0 a2=0 a3=7ffc09f34aac items=0 ppid=2045 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:28.474000 audit[2329]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:28.474000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc09f34ac0 a2=0 a3=0 items=0 ppid=2045 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:28.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:29.931516 update_engine[1195]: I1031 01:18:29.931466 1195 update_attempter.cc:509] Updating boot flags... Oct 31 01:18:30.547000 audit[2346]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:30.547000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffca2d636f0 a2=0 a3=7ffca2d636dc items=0 ppid=2045 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:30.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:30.552000 audit[2346]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:30.552000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca2d636f0 a2=0 a3=0 items=0 ppid=2045 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:30.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:30.586000 audit[2348]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:30.586000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe4d921910 a2=0 a3=7ffe4d9218fc items=0 ppid=2045 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:30.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:30.593000 audit[2348]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:30.593000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe4d921910 a2=0 a3=0 items=0 ppid=2045 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:30.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:32.137000 audit[2350]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:32.137000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffde7c63a50 a2=0 a3=7ffde7c63a3c items=0 ppid=2045 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:32.143000 audit[2350]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:32.143000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde7c63a50 a2=0 a3=0 items=0 ppid=2045 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:32.162589 systemd[1]: Created slice kubepods-besteffort-pod00e664bf_8805_40ec_ac78_dc673d3a11f6.slice. Oct 31 01:18:32.351498 systemd[1]: Created slice kubepods-besteffort-pod83d80d6f_f51c_4c70_a8dd_f851ebd597da.slice. Oct 31 01:18:32.352352 kubelet[1938]: I1031 01:18:32.352287 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-flexvol-driver-host\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352352 kubelet[1938]: I1031 01:18:32.352318 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-lib-modules\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352352 kubelet[1938]: I1031 01:18:32.352333 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/83d80d6f-f51c-4c70-a8dd-f851ebd597da-tigera-ca-bundle\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352352 kubelet[1938]: I1031 01:18:32.352348 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-cni-log-dir\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352681 kubelet[1938]: I1031 01:18:32.352363 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-var-run-calico\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352681 kubelet[1938]: I1031 01:18:32.352430 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtllh\" (UniqueName: \"kubernetes.io/projected/83d80d6f-f51c-4c70-a8dd-f851ebd597da-kube-api-access-dtllh\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352681 kubelet[1938]: I1031 01:18:32.352498 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6htqz\" (UniqueName: \"kubernetes.io/projected/00e664bf-8805-40ec-ac78-dc673d3a11f6-kube-api-access-6htqz\") pod \"calico-typha-55dc8bffcc-2mxxx\" (UID: \"00e664bf-8805-40ec-ac78-dc673d3a11f6\") " pod="calico-system/calico-typha-55dc8bffcc-2mxxx" Oct 31 01:18:32.352681 kubelet[1938]: I1031 01:18:32.352528 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-xtables-lock\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352681 kubelet[1938]: I1031 01:18:32.352548 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-var-lib-calico\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352797 kubelet[1938]: I1031 01:18:32.352573 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/83d80d6f-f51c-4c70-a8dd-f851ebd597da-node-certs\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352797 kubelet[1938]: I1031 01:18:32.352594 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-cni-net-dir\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352797 kubelet[1938]: I1031 01:18:32.352607 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-policysync\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.352797 kubelet[1938]: I1031 01:18:32.352624 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/00e664bf-8805-40ec-ac78-dc673d3a11f6-tigera-ca-bundle\") pod \"calico-typha-55dc8bffcc-2mxxx\" (UID: \"00e664bf-8805-40ec-ac78-dc673d3a11f6\") " pod="calico-system/calico-typha-55dc8bffcc-2mxxx" Oct 31 01:18:32.352797 kubelet[1938]: I1031 01:18:32.352638 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/00e664bf-8805-40ec-ac78-dc673d3a11f6-typha-certs\") pod \"calico-typha-55dc8bffcc-2mxxx\" (UID: \"00e664bf-8805-40ec-ac78-dc673d3a11f6\") " pod="calico-system/calico-typha-55dc8bffcc-2mxxx" Oct 31 01:18:32.352922 kubelet[1938]: I1031 01:18:32.352667 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/83d80d6f-f51c-4c70-a8dd-f851ebd597da-cni-bin-dir\") pod \"calico-node-gpjxp\" (UID: \"83d80d6f-f51c-4c70-a8dd-f851ebd597da\") " pod="calico-system/calico-node-gpjxp" Oct 31 01:18:32.454023 kubelet[1938]: E1031 01:18:32.453991 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.454023 kubelet[1938]: W1031 01:18:32.454013 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.454193 kubelet[1938]: E1031 01:18:32.454047 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.454193 kubelet[1938]: E1031 01:18:32.454160 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.454193 kubelet[1938]: W1031 01:18:32.454167 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.454193 kubelet[1938]: E1031 01:18:32.454192 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.454321 kubelet[1938]: E1031 01:18:32.454296 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.454321 kubelet[1938]: W1031 01:18:32.454310 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.454321 kubelet[1938]: E1031 01:18:32.454323 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.455433 kubelet[1938]: E1031 01:18:32.454484 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.455433 kubelet[1938]: W1031 01:18:32.454494 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.455433 kubelet[1938]: E1031 01:18:32.454508 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.455433 kubelet[1938]: E1031 01:18:32.454616 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.455433 kubelet[1938]: W1031 01:18:32.454622 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.455433 kubelet[1938]: E1031 01:18:32.454629 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.457119 kubelet[1938]: E1031 01:18:32.457089 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.457119 kubelet[1938]: W1031 01:18:32.457111 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.457199 kubelet[1938]: E1031 01:18:32.457129 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.462787 kubelet[1938]: E1031 01:18:32.462760 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.462787 kubelet[1938]: W1031 01:18:32.462777 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.462966 kubelet[1938]: E1031 01:18:32.462796 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.465291 kubelet[1938]: E1031 01:18:32.465272 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.465291 kubelet[1938]: W1031 01:18:32.465288 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.465369 kubelet[1938]: E1031 01:18:32.465301 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.465823 kubelet[1938]: E1031 01:18:32.465808 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.465823 kubelet[1938]: W1031 01:18:32.465819 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.465899 kubelet[1938]: E1031 01:18:32.465830 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.543103 kubelet[1938]: E1031 01:18:32.543049 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:32.553076 kubelet[1938]: E1031 01:18:32.553034 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.553076 kubelet[1938]: W1031 01:18:32.553068 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.553205 kubelet[1938]: E1031 01:18:32.553092 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.553433 kubelet[1938]: E1031 01:18:32.553392 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.553433 kubelet[1938]: W1031 01:18:32.553423 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.553433 kubelet[1938]: E1031 01:18:32.553432 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.553699 kubelet[1938]: E1031 01:18:32.553671 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.553699 kubelet[1938]: W1031 01:18:32.553692 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.553772 kubelet[1938]: E1031 01:18:32.553707 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.553969 kubelet[1938]: E1031 01:18:32.553952 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.553969 kubelet[1938]: W1031 01:18:32.553964 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554042 kubelet[1938]: E1031 01:18:32.553973 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.554199 kubelet[1938]: E1031 01:18:32.554172 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.554199 kubelet[1938]: W1031 01:18:32.554193 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554253 kubelet[1938]: E1031 01:18:32.554202 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.554356 kubelet[1938]: E1031 01:18:32.554341 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.554356 kubelet[1938]: W1031 01:18:32.554350 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554356 kubelet[1938]: E1031 01:18:32.554356 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.554604 kubelet[1938]: E1031 01:18:32.554497 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.554604 kubelet[1938]: W1031 01:18:32.554504 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554604 kubelet[1938]: E1031 01:18:32.554511 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.554736 kubelet[1938]: E1031 01:18:32.554724 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.554736 kubelet[1938]: W1031 01:18:32.554733 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554781 kubelet[1938]: E1031 01:18:32.554740 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.554916 kubelet[1938]: E1031 01:18:32.554901 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.554916 kubelet[1938]: W1031 01:18:32.554910 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.554916 kubelet[1938]: E1031 01:18:32.554917 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555069 kubelet[1938]: E1031 01:18:32.555057 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555069 kubelet[1938]: W1031 01:18:32.555066 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555117 kubelet[1938]: E1031 01:18:32.555074 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555232 kubelet[1938]: E1031 01:18:32.555221 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555232 kubelet[1938]: W1031 01:18:32.555229 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555286 kubelet[1938]: E1031 01:18:32.555239 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555384 kubelet[1938]: E1031 01:18:32.555374 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555384 kubelet[1938]: W1031 01:18:32.555382 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555459 kubelet[1938]: E1031 01:18:32.555389 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555561 kubelet[1938]: E1031 01:18:32.555549 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555561 kubelet[1938]: W1031 01:18:32.555558 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555608 kubelet[1938]: E1031 01:18:32.555565 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555730 kubelet[1938]: E1031 01:18:32.555719 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555730 kubelet[1938]: W1031 01:18:32.555727 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555779 kubelet[1938]: E1031 01:18:32.555735 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.555879 kubelet[1938]: E1031 01:18:32.555869 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.555879 kubelet[1938]: W1031 01:18:32.555877 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.555930 kubelet[1938]: E1031 01:18:32.555883 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556032 kubelet[1938]: E1031 01:18:32.556022 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556032 kubelet[1938]: W1031 01:18:32.556031 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556078 kubelet[1938]: E1031 01:18:32.556037 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556227 kubelet[1938]: E1031 01:18:32.556212 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556227 kubelet[1938]: W1031 01:18:32.556221 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556227 kubelet[1938]: E1031 01:18:32.556228 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556372 kubelet[1938]: E1031 01:18:32.556359 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556372 kubelet[1938]: W1031 01:18:32.556368 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556443 kubelet[1938]: E1031 01:18:32.556375 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556544 kubelet[1938]: E1031 01:18:32.556532 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556544 kubelet[1938]: W1031 01:18:32.556542 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556595 kubelet[1938]: E1031 01:18:32.556548 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556682 kubelet[1938]: E1031 01:18:32.556671 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556682 kubelet[1938]: W1031 01:18:32.556680 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556731 kubelet[1938]: E1031 01:18:32.556686 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.556913 kubelet[1938]: E1031 01:18:32.556897 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.556913 kubelet[1938]: W1031 01:18:32.556907 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.556913 kubelet[1938]: E1031 01:18:32.556914 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.557002 kubelet[1938]: I1031 01:18:32.556934 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1ce78460-3484-4444-8dae-aa63d95c2fad-varrun\") pod \"csi-node-driver-mxv8z\" (UID: \"1ce78460-3484-4444-8dae-aa63d95c2fad\") " pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:32.557100 kubelet[1938]: E1031 01:18:32.557083 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.557128 kubelet[1938]: W1031 01:18:32.557109 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.557128 kubelet[1938]: E1031 01:18:32.557126 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.557175 kubelet[1938]: I1031 01:18:32.557153 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1ce78460-3484-4444-8dae-aa63d95c2fad-kubelet-dir\") pod \"csi-node-driver-mxv8z\" (UID: \"1ce78460-3484-4444-8dae-aa63d95c2fad\") " pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:32.557341 kubelet[1938]: E1031 01:18:32.557329 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.557341 kubelet[1938]: W1031 01:18:32.557339 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.557388 kubelet[1938]: E1031 01:18:32.557352 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.557388 kubelet[1938]: I1031 01:18:32.557367 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jngkz\" (UniqueName: \"kubernetes.io/projected/1ce78460-3484-4444-8dae-aa63d95c2fad-kube-api-access-jngkz\") pod \"csi-node-driver-mxv8z\" (UID: \"1ce78460-3484-4444-8dae-aa63d95c2fad\") " pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:32.557603 kubelet[1938]: E1031 01:18:32.557578 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.557634 kubelet[1938]: W1031 01:18:32.557603 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.557634 kubelet[1938]: E1031 01:18:32.557629 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.557794 kubelet[1938]: E1031 01:18:32.557779 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.557794 kubelet[1938]: W1031 01:18:32.557788 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.557864 kubelet[1938]: E1031 01:18:32.557799 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.557955 kubelet[1938]: E1031 01:18:32.557941 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.557955 kubelet[1938]: W1031 01:18:32.557951 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558003 kubelet[1938]: E1031 01:18:32.557964 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558114 kubelet[1938]: E1031 01:18:32.558104 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.558114 kubelet[1938]: W1031 01:18:32.558112 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558159 kubelet[1938]: E1031 01:18:32.558124 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558285 kubelet[1938]: E1031 01:18:32.558273 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.558285 kubelet[1938]: W1031 01:18:32.558282 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558330 kubelet[1938]: E1031 01:18:32.558293 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558330 kubelet[1938]: I1031 01:18:32.558306 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1ce78460-3484-4444-8dae-aa63d95c2fad-registration-dir\") pod \"csi-node-driver-mxv8z\" (UID: \"1ce78460-3484-4444-8dae-aa63d95c2fad\") " pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:32.558501 kubelet[1938]: E1031 01:18:32.558488 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.558501 kubelet[1938]: W1031 01:18:32.558499 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558553 kubelet[1938]: E1031 01:18:32.558512 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558664 kubelet[1938]: E1031 01:18:32.558649 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.558664 kubelet[1938]: W1031 01:18:32.558658 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558729 kubelet[1938]: E1031 01:18:32.558670 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558842 kubelet[1938]: E1031 01:18:32.558827 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.558842 kubelet[1938]: W1031 01:18:32.558837 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.558915 kubelet[1938]: E1031 01:18:32.558849 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.558915 kubelet[1938]: I1031 01:18:32.558863 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1ce78460-3484-4444-8dae-aa63d95c2fad-socket-dir\") pod \"csi-node-driver-mxv8z\" (UID: \"1ce78460-3484-4444-8dae-aa63d95c2fad\") " pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:32.559033 kubelet[1938]: E1031 01:18:32.559010 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.559033 kubelet[1938]: W1031 01:18:32.559023 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.559033 kubelet[1938]: E1031 01:18:32.559036 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.559250 kubelet[1938]: E1031 01:18:32.559225 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.559285 kubelet[1938]: W1031 01:18:32.559249 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.559285 kubelet[1938]: E1031 01:18:32.559275 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.559482 kubelet[1938]: E1031 01:18:32.559466 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.559482 kubelet[1938]: W1031 01:18:32.559477 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.559562 kubelet[1938]: E1031 01:18:32.559487 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.559664 kubelet[1938]: E1031 01:18:32.559647 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.559664 kubelet[1938]: W1031 01:18:32.559659 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.559738 kubelet[1938]: E1031 01:18:32.559673 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.654720 kubelet[1938]: E1031 01:18:32.654683 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:32.655197 env[1202]: time="2025-10-31T01:18:32.655149548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gpjxp,Uid:83d80d6f-f51c-4c70-a8dd-f851ebd597da,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:32.659889 kubelet[1938]: E1031 01:18:32.659864 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.659889 kubelet[1938]: W1031 01:18:32.659881 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.659984 kubelet[1938]: E1031 01:18:32.659901 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.660170 kubelet[1938]: E1031 01:18:32.660149 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.660170 kubelet[1938]: W1031 01:18:32.660159 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.660263 kubelet[1938]: E1031 01:18:32.660172 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.660345 kubelet[1938]: E1031 01:18:32.660332 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.660345 kubelet[1938]: W1031 01:18:32.660341 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.660442 kubelet[1938]: E1031 01:18:32.660352 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.660634 kubelet[1938]: E1031 01:18:32.660616 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.660634 kubelet[1938]: W1031 01:18:32.660631 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.660701 kubelet[1938]: E1031 01:18:32.660654 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.660838 kubelet[1938]: E1031 01:18:32.660824 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.660838 kubelet[1938]: W1031 01:18:32.660833 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.660913 kubelet[1938]: E1031 01:18:32.660844 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.660981 kubelet[1938]: E1031 01:18:32.660968 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.660981 kubelet[1938]: W1031 01:18:32.660976 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.661028 kubelet[1938]: E1031 01:18:32.660987 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.661142 kubelet[1938]: E1031 01:18:32.661126 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.661142 kubelet[1938]: W1031 01:18:32.661137 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.661223 kubelet[1938]: E1031 01:18:32.661150 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.661313 kubelet[1938]: E1031 01:18:32.661297 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.661313 kubelet[1938]: W1031 01:18:32.661309 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.661385 kubelet[1938]: E1031 01:18:32.661322 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.661522 kubelet[1938]: E1031 01:18:32.661508 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.661522 kubelet[1938]: W1031 01:18:32.661517 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.661593 kubelet[1938]: E1031 01:18:32.661528 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.661784 kubelet[1938]: E1031 01:18:32.661761 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.661784 kubelet[1938]: W1031 01:18:32.661781 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.661864 kubelet[1938]: E1031 01:18:32.661803 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662057 kubelet[1938]: E1031 01:18:32.662044 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662057 kubelet[1938]: W1031 01:18:32.662053 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662108 kubelet[1938]: E1031 01:18:32.662064 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662231 kubelet[1938]: E1031 01:18:32.662219 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662231 kubelet[1938]: W1031 01:18:32.662228 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662280 kubelet[1938]: E1031 01:18:32.662239 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662425 kubelet[1938]: E1031 01:18:32.662395 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662425 kubelet[1938]: W1031 01:18:32.662405 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662482 kubelet[1938]: E1031 01:18:32.662433 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662615 kubelet[1938]: E1031 01:18:32.662601 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662615 kubelet[1938]: W1031 01:18:32.662613 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662680 kubelet[1938]: E1031 01:18:32.662667 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662777 kubelet[1938]: E1031 01:18:32.662763 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662777 kubelet[1938]: W1031 01:18:32.662774 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662852 kubelet[1938]: E1031 01:18:32.662800 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.662927 kubelet[1938]: E1031 01:18:32.662913 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.662927 kubelet[1938]: W1031 01:18:32.662921 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.662996 kubelet[1938]: E1031 01:18:32.662942 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.663091 kubelet[1938]: E1031 01:18:32.663077 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.663091 kubelet[1938]: W1031 01:18:32.663086 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.663164 kubelet[1938]: E1031 01:18:32.663097 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.663264 kubelet[1938]: E1031 01:18:32.663249 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.663264 kubelet[1938]: W1031 01:18:32.663259 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.663329 kubelet[1938]: E1031 01:18:32.663271 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.663450 kubelet[1938]: E1031 01:18:32.663436 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.663450 kubelet[1938]: W1031 01:18:32.663446 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.663524 kubelet[1938]: E1031 01:18:32.663459 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.663686 kubelet[1938]: E1031 01:18:32.663655 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.663686 kubelet[1938]: W1031 01:18:32.663678 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.663844 kubelet[1938]: E1031 01:18:32.663709 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.663952 kubelet[1938]: E1031 01:18:32.663928 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.663952 kubelet[1938]: W1031 01:18:32.663941 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.664057 kubelet[1938]: E1031 01:18:32.663955 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.664106 kubelet[1938]: E1031 01:18:32.664091 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.664106 kubelet[1938]: W1031 01:18:32.664101 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.664196 kubelet[1938]: E1031 01:18:32.664135 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.664343 kubelet[1938]: E1031 01:18:32.664327 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.664343 kubelet[1938]: W1031 01:18:32.664338 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.664433 kubelet[1938]: E1031 01:18:32.664351 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.664589 kubelet[1938]: E1031 01:18:32.664577 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.664589 kubelet[1938]: W1031 01:18:32.664586 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.664666 kubelet[1938]: E1031 01:18:32.664597 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.664809 kubelet[1938]: E1031 01:18:32.664796 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.664809 kubelet[1938]: W1031 01:18:32.664806 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.664882 kubelet[1938]: E1031 01:18:32.664814 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.672564 env[1202]: time="2025-10-31T01:18:32.672505213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:32.672564 env[1202]: time="2025-10-31T01:18:32.672543485Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:32.672805 env[1202]: time="2025-10-31T01:18:32.672760878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:32.673525 kubelet[1938]: E1031 01:18:32.673000 1938 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:32.673525 kubelet[1938]: W1031 01:18:32.673015 1938 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:32.673525 kubelet[1938]: E1031 01:18:32.673030 1938 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:32.673920 env[1202]: time="2025-10-31T01:18:32.673888185Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8 pid=2432 runtime=io.containerd.runc.v2 Oct 31 01:18:32.683912 systemd[1]: Started cri-containerd-f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8.scope. Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit: BPF prog-id=118 op=LOAD Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2432 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353364666366323337393966366136393333626562633333326137 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2432 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353364666366323337393966366136393333626562633333326137 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit: BPF prog-id=119 op=LOAD Oct 31 01:18:32.693000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000294a10 items=0 ppid=2432 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353364666366323337393966366136393333626562633333326137 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit: BPF prog-id=120 op=LOAD Oct 31 01:18:32.693000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000294a58 items=0 ppid=2432 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353364666366323337393966366136393333626562633333326137 Oct 31 01:18:32.693000 audit: BPF prog-id=120 op=UNLOAD Oct 31 01:18:32.693000 audit: BPF prog-id=119 op=UNLOAD Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.693000 audit: BPF prog-id=121 op=LOAD Oct 31 01:18:32.693000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000294e68 items=0 ppid=2432 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353364666366323337393966366136393333626562633333326137 Oct 31 01:18:32.709032 env[1202]: time="2025-10-31T01:18:32.708941774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gpjxp,Uid:83d80d6f-f51c-4c70-a8dd-f851ebd597da,Namespace:calico-system,Attempt:0,} returns sandbox id \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\"" Oct 31 01:18:32.710015 kubelet[1938]: E1031 01:18:32.709976 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:32.711887 env[1202]: time="2025-10-31T01:18:32.710934392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:18:32.764713 kubelet[1938]: E1031 01:18:32.764673 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:32.765112 env[1202]: time="2025-10-31T01:18:32.765086207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-55dc8bffcc-2mxxx,Uid:00e664bf-8805-40ec-ac78-dc673d3a11f6,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:32.785241 env[1202]: time="2025-10-31T01:18:32.785184863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:32.785241 env[1202]: time="2025-10-31T01:18:32.785220481Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:32.785241 env[1202]: time="2025-10-31T01:18:32.785230469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:32.785474 env[1202]: time="2025-10-31T01:18:32.785397837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83b7119d7b8a15a957d0f3b056ea9e7fabc6608f2cb787df86318cce538dac3b pid=2475 runtime=io.containerd.runc.v2 Oct 31 01:18:32.796140 systemd[1]: Started cri-containerd-83b7119d7b8a15a957d0f3b056ea9e7fabc6608f2cb787df86318cce538dac3b.scope. Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit: BPF prog-id=122 op=LOAD Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623731313964376238613135613935376430663362303536656139 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623731313964376238613135613935376430663362303536656139 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.805000 audit: BPF prog-id=123 op=LOAD Oct 31 01:18:32.805000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031e670 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623731313964376238613135613935376430663362303536656139 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit: BPF prog-id=124 op=LOAD Oct 31 01:18:32.806000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031e6b8 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623731313964376238613135613935376430663362303536656139 Oct 31 01:18:32.806000 audit: BPF prog-id=124 op=UNLOAD Oct 31 01:18:32.806000 audit: BPF prog-id=123 op=UNLOAD Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:32.806000 audit: BPF prog-id=125 op=LOAD Oct 31 01:18:32.806000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031eac8 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:32.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623731313964376238613135613935376430663362303536656139 Oct 31 01:18:32.829457 env[1202]: time="2025-10-31T01:18:32.829380854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-55dc8bffcc-2mxxx,Uid:00e664bf-8805-40ec-ac78-dc673d3a11f6,Namespace:calico-system,Attempt:0,} returns sandbox id \"83b7119d7b8a15a957d0f3b056ea9e7fabc6608f2cb787df86318cce538dac3b\"" Oct 31 01:18:32.829994 kubelet[1938]: E1031 01:18:32.829968 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:33.153000 audit[2509]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:33.153000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff74bfb970 a2=0 a3=7fff74bfb95c items=0 ppid=2045 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:33.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:33.158000 audit[2509]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:33.158000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff74bfb970 a2=0 a3=0 items=0 ppid=2045 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:33.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:33.990958 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3315511304.mount: Deactivated successfully. Oct 31 01:18:34.101037 env[1202]: time="2025-10-31T01:18:34.100989043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:34.102791 env[1202]: time="2025-10-31T01:18:34.102740420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:34.104278 env[1202]: time="2025-10-31T01:18:34.104231333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:34.105505 env[1202]: time="2025-10-31T01:18:34.105461311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:34.105874 env[1202]: time="2025-10-31T01:18:34.105848785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:18:34.106789 env[1202]: time="2025-10-31T01:18:34.106759861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 31 01:18:34.107760 env[1202]: time="2025-10-31T01:18:34.107728334Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:18:34.121397 env[1202]: time="2025-10-31T01:18:34.121322313Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84\"" Oct 31 01:18:34.121905 env[1202]: time="2025-10-31T01:18:34.121867605Z" level=info msg="StartContainer for \"6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84\"" Oct 31 01:18:34.136160 systemd[1]: Started cri-containerd-6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84.scope. Oct 31 01:18:34.156457 kernel: kauditd_printk_skb: 145 callbacks suppressed Oct 31 01:18:34.156588 kernel: audit: type=1400 audit(1761873514.148:963): avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7eff9f1e3db8 items=0 ppid=2432 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:34.165426 kernel: audit: type=1300 audit(1761873514.148:963): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7eff9f1e3db8 items=0 ppid=2432 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:34.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662303737333965643834303739333336333765303433663036386563 Oct 31 01:18:34.178097 kernel: audit: type=1327 audit(1761873514.148:963): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662303737333965643834303739333336333765303433663036386563 Oct 31 01:18:34.178151 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.183388 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.183581 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.187977 env[1202]: time="2025-10-31T01:18:34.187936141Z" level=info msg="StartContainer for \"6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84\" returns successfully" Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.189240 systemd[1]: cri-containerd-6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84.scope: Deactivated successfully. Oct 31 01:18:34.194260 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.199447 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.199587 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.209706 kernel: audit: type=1400 audit(1761873514.148:964): avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.148000 audit: BPF prog-id=126 op=LOAD Oct 31 01:18:34.148000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000319f58 items=0 ppid=2432 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:34.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662303737333965643834303739333336333765303433663036386563 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit: BPF prog-id=127 op=LOAD Oct 31 01:18:34.155000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000319fa8 items=0 ppid=2432 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:34.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662303737333965643834303739333336333765303433663036386563 Oct 31 01:18:34.155000 audit: BPF prog-id=127 op=UNLOAD Oct 31 01:18:34.155000 audit: BPF prog-id=126 op=UNLOAD Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:34.155000 audit: BPF prog-id=128 op=LOAD Oct 31 01:18:34.155000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000352038 items=0 ppid=2432 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:34.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662303737333965643834303739333336333765303433663036386563 Oct 31 01:18:34.212000 audit: BPF prog-id=128 op=UNLOAD Oct 31 01:18:34.226223 env[1202]: time="2025-10-31T01:18:34.226150426Z" level=info msg="shim disconnected" id=6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84 Oct 31 01:18:34.226223 env[1202]: time="2025-10-31T01:18:34.226201663Z" level=warning msg="cleaning up after shim disconnected" id=6b07739ed8407933637e043f068ecde90a0e957ec81c1143467283e518838f84 namespace=k8s.io Oct 31 01:18:34.226223 env[1202]: time="2025-10-31T01:18:34.226211923Z" level=info msg="cleaning up dead shim" Oct 31 01:18:34.233852 env[1202]: time="2025-10-31T01:18:34.233820579Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:18:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2558 runtime=io.containerd.runc.v2\n" Oct 31 01:18:34.537334 kubelet[1938]: E1031 01:18:34.537278 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:34.580008 kubelet[1938]: E1031 01:18:34.579969 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:36.537227 kubelet[1938]: E1031 01:18:36.537185 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:37.559398 env[1202]: time="2025-10-31T01:18:37.559339331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:37.561236 env[1202]: time="2025-10-31T01:18:37.561217291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:37.562735 env[1202]: time="2025-10-31T01:18:37.562681368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:37.564341 env[1202]: time="2025-10-31T01:18:37.564291291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:37.564730 env[1202]: time="2025-10-31T01:18:37.564703801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 31 01:18:37.566452 env[1202]: time="2025-10-31T01:18:37.566388786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:18:37.574760 env[1202]: time="2025-10-31T01:18:37.574713201Z" level=info msg="CreateContainer within sandbox \"83b7119d7b8a15a957d0f3b056ea9e7fabc6608f2cb787df86318cce538dac3b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 31 01:18:37.589809 env[1202]: time="2025-10-31T01:18:37.589761747Z" level=info msg="CreateContainer within sandbox \"83b7119d7b8a15a957d0f3b056ea9e7fabc6608f2cb787df86318cce538dac3b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"21edd1ac0dd90c98809a7411c16af60b14cac99bfe47d9a00f6b5544ccdaa349\"" Oct 31 01:18:37.590277 env[1202]: time="2025-10-31T01:18:37.590247956Z" level=info msg="StartContainer for \"21edd1ac0dd90c98809a7411c16af60b14cac99bfe47d9a00f6b5544ccdaa349\"" Oct 31 01:18:37.604858 systemd[1]: Started cri-containerd-21edd1ac0dd90c98809a7411c16af60b14cac99bfe47d9a00f6b5544ccdaa349.scope. Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.613000 audit: BPF prog-id=129 op=LOAD Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2475 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:37.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231656464316163306464393063393838303961373431316331366166 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2475 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:37.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231656464316163306464393063393838303961373431316331366166 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.614000 audit: BPF prog-id=130 op=LOAD Oct 31 01:18:37.614000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000290930 items=0 ppid=2475 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:37.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231656464316163306464393063393838303961373431316331366166 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.615000 audit: BPF prog-id=131 op=LOAD Oct 31 01:18:37.615000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000290978 items=0 ppid=2475 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:37.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231656464316163306464393063393838303961373431316331366166 Oct 31 01:18:37.616000 audit: BPF prog-id=131 op=UNLOAD Oct 31 01:18:37.616000 audit: BPF prog-id=130 op=UNLOAD Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:37.616000 audit: BPF prog-id=132 op=LOAD Oct 31 01:18:37.616000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000290d88 items=0 ppid=2475 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:37.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231656464316163306464393063393838303961373431316331366166 Oct 31 01:18:37.641837 env[1202]: time="2025-10-31T01:18:37.641794451Z" level=info msg="StartContainer for \"21edd1ac0dd90c98809a7411c16af60b14cac99bfe47d9a00f6b5544ccdaa349\" returns successfully" Oct 31 01:18:38.537086 kubelet[1938]: E1031 01:18:38.537039 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:38.587094 kubelet[1938]: E1031 01:18:38.587045 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:39.590343 kubelet[1938]: I1031 01:18:39.590310 1938 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 01:18:39.590696 kubelet[1938]: E1031 01:18:39.590588 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:40.539203 kubelet[1938]: E1031 01:18:40.539130 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:41.095193 env[1202]: time="2025-10-31T01:18:41.095143714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:41.096854 env[1202]: time="2025-10-31T01:18:41.096814546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:41.098234 env[1202]: time="2025-10-31T01:18:41.098208146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:41.099517 env[1202]: time="2025-10-31T01:18:41.099477261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:41.099913 env[1202]: time="2025-10-31T01:18:41.099880632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:18:41.103812 env[1202]: time="2025-10-31T01:18:41.103767916Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:18:41.119254 env[1202]: time="2025-10-31T01:18:41.119203501Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667\"" Oct 31 01:18:41.119728 env[1202]: time="2025-10-31T01:18:41.119701972Z" level=info msg="StartContainer for \"ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667\"" Oct 31 01:18:41.135894 systemd[1]: Started cri-containerd-ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667.scope. Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.148520 kernel: kauditd_printk_skb: 91 callbacks suppressed Oct 31 01:18:41.148573 kernel: audit: type=1400 audit(1761873521.145:988): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f63e6a93d28 items=0 ppid=2432 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:41.161296 kernel: audit: type=1300 audit(1761873521.145:988): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f63e6a93d28 items=0 ppid=2432 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:41.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393466633437316565643763623034366537363964616431383531 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.175110 kernel: audit: type=1327 audit(1761873521.145:988): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393466633437316565643763623034366537363964616431383531 Oct 31 01:18:41.175177 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.175198 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.190732 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.190854 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.190876 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.200591 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.205547 kernel: audit: type=1400 audit(1761873521.145:989): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.145000 audit: BPF prog-id=133 op=LOAD Oct 31 01:18:41.145000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a26a8 items=0 ppid=2432 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:41.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393466633437316565643763623034366537363964616431383531 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.152000 audit: BPF prog-id=134 op=LOAD Oct 31 01:18:41.152000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a26f8 items=0 ppid=2432 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:41.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393466633437316565643763623034366537363964616431383531 Oct 31 01:18:41.159000 audit: BPF prog-id=134 op=UNLOAD Oct 31 01:18:41.159000 audit: BPF prog-id=133 op=UNLOAD Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:41.159000 audit: BPF prog-id=135 op=LOAD Oct 31 01:18:41.159000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2788 items=0 ppid=2432 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:41.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365393466633437316565643763623034366537363964616431383531 Oct 31 01:18:41.234610 env[1202]: time="2025-10-31T01:18:41.234562387Z" level=info msg="StartContainer for \"ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667\" returns successfully" Oct 31 01:18:41.600357 kubelet[1938]: E1031 01:18:41.600327 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:41.614306 kubelet[1938]: I1031 01:18:41.614255 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-55dc8bffcc-2mxxx" podStartSLOduration=4.87922036 podStartE2EDuration="9.614231176s" podCreationTimestamp="2025-10-31 01:18:32 +0000 UTC" firstStartedPulling="2025-10-31 01:18:32.831239198 +0000 UTC m=+19.362678732" lastFinishedPulling="2025-10-31 01:18:37.566250014 +0000 UTC m=+24.097689548" observedRunningTime="2025-10-31 01:18:38.598090235 +0000 UTC m=+25.129529769" watchObservedRunningTime="2025-10-31 01:18:41.614231176 +0000 UTC m=+28.145670710" Oct 31 01:18:42.153291 env[1202]: time="2025-10-31T01:18:42.153221964Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:18:42.155031 systemd[1]: cri-containerd-ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667.scope: Deactivated successfully. Oct 31 01:18:42.159000 audit: BPF prog-id=135 op=UNLOAD Oct 31 01:18:42.170727 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667-rootfs.mount: Deactivated successfully. Oct 31 01:18:42.206647 kubelet[1938]: I1031 01:18:42.206623 1938 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 01:18:42.353894 env[1202]: time="2025-10-31T01:18:42.353847510Z" level=info msg="shim disconnected" id=ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667 Oct 31 01:18:42.353894 env[1202]: time="2025-10-31T01:18:42.353893858Z" level=warning msg="cleaning up after shim disconnected" id=ce94fc471eed7cb046e769dad1851d5e588bff4d3e9e5ee4807dcab479f6e667 namespace=k8s.io Oct 31 01:18:42.354125 env[1202]: time="2025-10-31T01:18:42.353919115Z" level=info msg="cleaning up dead shim" Oct 31 01:18:42.365061 env[1202]: time="2025-10-31T01:18:42.365002521Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:18:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2667 runtime=io.containerd.runc.v2\n" Oct 31 01:18:42.368059 systemd[1]: Created slice kubepods-burstable-podc563bd83_bb8b_4ae5_aacd_c471087df722.slice. Oct 31 01:18:42.372055 systemd[1]: Created slice kubepods-besteffort-poda2219756_4569_4e7b_baa1_ed625e289d0f.slice. Oct 31 01:18:42.376248 systemd[1]: Created slice kubepods-besteffort-podc87c79af_530b_425e_a78b_abdafda90897.slice. Oct 31 01:18:42.380219 systemd[1]: Created slice kubepods-besteffort-pod69bb3f27_4922_4932_a7d6_aa046762d839.slice. Oct 31 01:18:42.383781 kubelet[1938]: I1031 01:18:42.383740 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/c87c79af-530b-425e-a78b-abdafda90897-goldmane-key-pair\") pod \"goldmane-666569f655-p6cd4\" (UID: \"c87c79af-530b-425e-a78b-abdafda90897\") " pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.383903 kubelet[1938]: I1031 01:18:42.383806 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/69bb3f27-4922-4932-a7d6-aa046762d839-calico-apiserver-certs\") pod \"calico-apiserver-f875b9d54-r2d8s\" (UID: \"69bb3f27-4922-4932-a7d6-aa046762d839\") " pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" Oct 31 01:18:42.383903 kubelet[1938]: I1031 01:18:42.383823 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mqst5\" (UniqueName: \"kubernetes.io/projected/69bb3f27-4922-4932-a7d6-aa046762d839-kube-api-access-mqst5\") pod \"calico-apiserver-f875b9d54-r2d8s\" (UID: \"69bb3f27-4922-4932-a7d6-aa046762d839\") " pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" Oct 31 01:18:42.383903 kubelet[1938]: I1031 01:18:42.383840 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a85f13d0-1c09-4bed-b439-c5aa71c1b595-calico-apiserver-certs\") pod \"calico-apiserver-f875b9d54-q5nq9\" (UID: \"a85f13d0-1c09-4bed-b439-c5aa71c1b595\") " pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" Oct 31 01:18:42.383903 kubelet[1938]: I1031 01:18:42.383853 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fzf5k\" (UniqueName: \"kubernetes.io/projected/c87c79af-530b-425e-a78b-abdafda90897-kube-api-access-fzf5k\") pod \"goldmane-666569f655-p6cd4\" (UID: \"c87c79af-530b-425e-a78b-abdafda90897\") " pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.383903 kubelet[1938]: I1031 01:18:42.383870 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/c87c79af-530b-425e-a78b-abdafda90897-config\") pod \"goldmane-666569f655-p6cd4\" (UID: \"c87c79af-530b-425e-a78b-abdafda90897\") " pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.384065 kubelet[1938]: I1031 01:18:42.383884 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5sppz\" (UniqueName: \"kubernetes.io/projected/0849090e-7f9a-48ac-8218-b70639608778-kube-api-access-5sppz\") pod \"calico-kube-controllers-5d898459cb-gjxrm\" (UID: \"0849090e-7f9a-48ac-8218-b70639608778\") " pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" Oct 31 01:18:42.384065 kubelet[1938]: I1031 01:18:42.383899 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rd2vm\" (UniqueName: \"kubernetes.io/projected/a85f13d0-1c09-4bed-b439-c5aa71c1b595-kube-api-access-rd2vm\") pod \"calico-apiserver-f875b9d54-q5nq9\" (UID: \"a85f13d0-1c09-4bed-b439-c5aa71c1b595\") " pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" Oct 31 01:18:42.384065 kubelet[1938]: I1031 01:18:42.383914 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0849090e-7f9a-48ac-8218-b70639608778-tigera-ca-bundle\") pod \"calico-kube-controllers-5d898459cb-gjxrm\" (UID: \"0849090e-7f9a-48ac-8218-b70639608778\") " pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" Oct 31 01:18:42.384065 kubelet[1938]: I1031 01:18:42.383930 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c87c79af-530b-425e-a78b-abdafda90897-goldmane-ca-bundle\") pod \"goldmane-666569f655-p6cd4\" (UID: \"c87c79af-530b-425e-a78b-abdafda90897\") " pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.385877 systemd[1]: Created slice kubepods-besteffort-poda85f13d0_1c09_4bed_b439_c5aa71c1b595.slice. Oct 31 01:18:42.389381 systemd[1]: Created slice kubepods-burstable-pod988ebf4f_1524_4f14_a6eb_f0cb2327f4d3.slice. Oct 31 01:18:42.393342 systemd[1]: Created slice kubepods-besteffort-pod0849090e_7f9a_48ac_8218_b70639608778.slice. Oct 31 01:18:42.484934 kubelet[1938]: I1031 01:18:42.484893 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-ca-bundle\") pod \"whisker-7f875f98bb-ls9l4\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " pod="calico-system/whisker-7f875f98bb-ls9l4" Oct 31 01:18:42.484934 kubelet[1938]: I1031 01:18:42.484940 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7hdt\" (UniqueName: \"kubernetes.io/projected/a2219756-4569-4e7b-baa1-ed625e289d0f-kube-api-access-r7hdt\") pod \"whisker-7f875f98bb-ls9l4\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " pod="calico-system/whisker-7f875f98bb-ls9l4" Oct 31 01:18:42.485141 kubelet[1938]: I1031 01:18:42.484960 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xkwsn\" (UniqueName: \"kubernetes.io/projected/c563bd83-bb8b-4ae5-aacd-c471087df722-kube-api-access-xkwsn\") pod \"coredns-668d6bf9bc-jhtwg\" (UID: \"c563bd83-bb8b-4ae5-aacd-c471087df722\") " pod="kube-system/coredns-668d6bf9bc-jhtwg" Oct 31 01:18:42.485141 kubelet[1938]: I1031 01:18:42.485019 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-backend-key-pair\") pod \"whisker-7f875f98bb-ls9l4\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " pod="calico-system/whisker-7f875f98bb-ls9l4" Oct 31 01:18:42.485141 kubelet[1938]: I1031 01:18:42.485035 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-clk29\" (UniqueName: \"kubernetes.io/projected/988ebf4f-1524-4f14-a6eb-f0cb2327f4d3-kube-api-access-clk29\") pod \"coredns-668d6bf9bc-6wb5j\" (UID: \"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3\") " pod="kube-system/coredns-668d6bf9bc-6wb5j" Oct 31 01:18:42.485141 kubelet[1938]: I1031 01:18:42.485084 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c563bd83-bb8b-4ae5-aacd-c471087df722-config-volume\") pod \"coredns-668d6bf9bc-jhtwg\" (UID: \"c563bd83-bb8b-4ae5-aacd-c471087df722\") " pod="kube-system/coredns-668d6bf9bc-jhtwg" Oct 31 01:18:42.485141 kubelet[1938]: I1031 01:18:42.485099 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/988ebf4f-1524-4f14-a6eb-f0cb2327f4d3-config-volume\") pod \"coredns-668d6bf9bc-6wb5j\" (UID: \"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3\") " pod="kube-system/coredns-668d6bf9bc-6wb5j" Oct 31 01:18:42.541343 systemd[1]: Created slice kubepods-besteffort-pod1ce78460_3484_4444_8dae_aa63d95c2fad.slice. Oct 31 01:18:42.543115 env[1202]: time="2025-10-31T01:18:42.543083776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mxv8z,Uid:1ce78460-3484-4444-8dae-aa63d95c2fad,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:42.604033 kubelet[1938]: E1031 01:18:42.603954 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:42.607509 env[1202]: time="2025-10-31T01:18:42.607478012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:18:42.615950 env[1202]: time="2025-10-31T01:18:42.615846576Z" level=error msg="Failed to destroy network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.616295 env[1202]: time="2025-10-31T01:18:42.616258984Z" level=error msg="encountered an error cleaning up failed sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.616331 env[1202]: time="2025-10-31T01:18:42.616308387Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mxv8z,Uid:1ce78460-3484-4444-8dae-aa63d95c2fad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.616537 kubelet[1938]: E1031 01:18:42.616497 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.616592 kubelet[1938]: E1031 01:18:42.616550 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:42.616592 kubelet[1938]: E1031 01:18:42.616572 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mxv8z" Oct 31 01:18:42.616664 kubelet[1938]: E1031 01:18:42.616609 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:42.670200 kubelet[1938]: E1031 01:18:42.670174 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:42.670748 env[1202]: time="2025-10-31T01:18:42.670694888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jhtwg,Uid:c563bd83-bb8b-4ae5-aacd-c471087df722,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:42.674435 env[1202]: time="2025-10-31T01:18:42.674379877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7f875f98bb-ls9l4,Uid:a2219756-4569-4e7b-baa1-ed625e289d0f,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:42.678849 env[1202]: time="2025-10-31T01:18:42.678813850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-p6cd4,Uid:c87c79af-530b-425e-a78b-abdafda90897,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:42.684389 env[1202]: time="2025-10-31T01:18:42.684330256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-r2d8s,Uid:69bb3f27-4922-4932-a7d6-aa046762d839,Namespace:calico-apiserver,Attempt:0,}" Oct 31 01:18:42.688079 env[1202]: time="2025-10-31T01:18:42.688052797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-q5nq9,Uid:a85f13d0-1c09-4bed-b439-c5aa71c1b595,Namespace:calico-apiserver,Attempt:0,}" Oct 31 01:18:42.691314 kubelet[1938]: E1031 01:18:42.691293 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:42.691617 env[1202]: time="2025-10-31T01:18:42.691584538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wb5j,Uid:988ebf4f-1524-4f14-a6eb-f0cb2327f4d3,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:42.696103 env[1202]: time="2025-10-31T01:18:42.696063306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d898459cb-gjxrm,Uid:0849090e-7f9a-48ac-8218-b70639608778,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:42.749086 env[1202]: time="2025-10-31T01:18:42.748940259Z" level=error msg="Failed to destroy network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.749666 env[1202]: time="2025-10-31T01:18:42.749640098Z" level=error msg="encountered an error cleaning up failed sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.756212 env[1202]: time="2025-10-31T01:18:42.756158563Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jhtwg,Uid:c563bd83-bb8b-4ae5-aacd-c471087df722,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.757459 kubelet[1938]: E1031 01:18:42.756501 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.757459 kubelet[1938]: E1031 01:18:42.756573 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jhtwg" Oct 31 01:18:42.757459 kubelet[1938]: E1031 01:18:42.756593 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jhtwg" Oct 31 01:18:42.757809 kubelet[1938]: E1031 01:18:42.756653 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-jhtwg_kube-system(c563bd83-bb8b-4ae5-aacd-c471087df722)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-jhtwg_kube-system(c563bd83-bb8b-4ae5-aacd-c471087df722)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jhtwg" podUID="c563bd83-bb8b-4ae5-aacd-c471087df722" Oct 31 01:18:42.788844 env[1202]: time="2025-10-31T01:18:42.788794169Z" level=error msg="Failed to destroy network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.789269 env[1202]: time="2025-10-31T01:18:42.789243717Z" level=error msg="encountered an error cleaning up failed sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.789384 env[1202]: time="2025-10-31T01:18:42.789356529Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7f875f98bb-ls9l4,Uid:a2219756-4569-4e7b-baa1-ed625e289d0f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.791334 kubelet[1938]: E1031 01:18:42.789717 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.791334 kubelet[1938]: E1031 01:18:42.789796 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7f875f98bb-ls9l4" Oct 31 01:18:42.791334 kubelet[1938]: E1031 01:18:42.789816 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7f875f98bb-ls9l4" Oct 31 01:18:42.791560 kubelet[1938]: E1031 01:18:42.789870 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-7f875f98bb-ls9l4_calico-system(a2219756-4569-4e7b-baa1-ed625e289d0f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-7f875f98bb-ls9l4_calico-system(a2219756-4569-4e7b-baa1-ed625e289d0f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7f875f98bb-ls9l4" podUID="a2219756-4569-4e7b-baa1-ed625e289d0f" Oct 31 01:18:42.811074 env[1202]: time="2025-10-31T01:18:42.811014469Z" level=error msg="Failed to destroy network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.811540 env[1202]: time="2025-10-31T01:18:42.811513680Z" level=error msg="encountered an error cleaning up failed sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.811656 env[1202]: time="2025-10-31T01:18:42.811628117Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-r2d8s,Uid:69bb3f27-4922-4932-a7d6-aa046762d839,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.812277 kubelet[1938]: E1031 01:18:42.811933 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.812277 kubelet[1938]: E1031 01:18:42.811986 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" Oct 31 01:18:42.812277 kubelet[1938]: E1031 01:18:42.812006 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" Oct 31 01:18:42.812391 kubelet[1938]: E1031 01:18:42.812059 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-f875b9d54-r2d8s_calico-apiserver(69bb3f27-4922-4932-a7d6-aa046762d839)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-f875b9d54-r2d8s_calico-apiserver(69bb3f27-4922-4932-a7d6-aa046762d839)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:18:42.824523 env[1202]: time="2025-10-31T01:18:42.824479906Z" level=error msg="Failed to destroy network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.824939 env[1202]: time="2025-10-31T01:18:42.824915178Z" level=error msg="encountered an error cleaning up failed sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.825069 env[1202]: time="2025-10-31T01:18:42.825024073Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-q5nq9,Uid:a85f13d0-1c09-4bed-b439-c5aa71c1b595,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.825376 kubelet[1938]: E1031 01:18:42.825333 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.825478 kubelet[1938]: E1031 01:18:42.825395 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" Oct 31 01:18:42.825478 kubelet[1938]: E1031 01:18:42.825433 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" Oct 31 01:18:42.825533 kubelet[1938]: E1031 01:18:42.825475 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-f875b9d54-q5nq9_calico-apiserver(a85f13d0-1c09-4bed-b439-c5aa71c1b595)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-f875b9d54-q5nq9_calico-apiserver(a85f13d0-1c09-4bed-b439-c5aa71c1b595)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:18:42.832684 env[1202]: time="2025-10-31T01:18:42.832628746Z" level=error msg="Failed to destroy network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.833148 env[1202]: time="2025-10-31T01:18:42.833119853Z" level=error msg="encountered an error cleaning up failed sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.833259 env[1202]: time="2025-10-31T01:18:42.833232465Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-p6cd4,Uid:c87c79af-530b-425e-a78b-abdafda90897,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.833831 kubelet[1938]: E1031 01:18:42.833524 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.833831 kubelet[1938]: E1031 01:18:42.833577 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.833831 kubelet[1938]: E1031 01:18:42.833593 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-p6cd4" Oct 31 01:18:42.833946 kubelet[1938]: E1031 01:18:42.833637 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-p6cd4_calico-system(c87c79af-530b-425e-a78b-abdafda90897)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-p6cd4_calico-system(c87c79af-530b-425e-a78b-abdafda90897)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:18:42.835244 env[1202]: time="2025-10-31T01:18:42.835206218Z" level=error msg="Failed to destroy network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.835523 env[1202]: time="2025-10-31T01:18:42.835453264Z" level=error msg="encountered an error cleaning up failed sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.835523 env[1202]: time="2025-10-31T01:18:42.835497277Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wb5j,Uid:988ebf4f-1524-4f14-a6eb-f0cb2327f4d3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.835702 kubelet[1938]: E1031 01:18:42.835594 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.835702 kubelet[1938]: E1031 01:18:42.835615 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6wb5j" Oct 31 01:18:42.835702 kubelet[1938]: E1031 01:18:42.835627 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6wb5j" Oct 31 01:18:42.835847 kubelet[1938]: E1031 01:18:42.835655 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6wb5j_kube-system(988ebf4f-1524-4f14-a6eb-f0cb2327f4d3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6wb5j_kube-system(988ebf4f-1524-4f14-a6eb-f0cb2327f4d3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6wb5j" podUID="988ebf4f-1524-4f14-a6eb-f0cb2327f4d3" Oct 31 01:18:42.840673 env[1202]: time="2025-10-31T01:18:42.840636721Z" level=error msg="Failed to destroy network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.840906 env[1202]: time="2025-10-31T01:18:42.840873988Z" level=error msg="encountered an error cleaning up failed sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.840943 env[1202]: time="2025-10-31T01:18:42.840909555Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d898459cb-gjxrm,Uid:0849090e-7f9a-48ac-8218-b70639608778,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.841127 kubelet[1938]: E1031 01:18:42.841091 1938 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:42.841181 kubelet[1938]: E1031 01:18:42.841125 1938 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" Oct 31 01:18:42.841181 kubelet[1938]: E1031 01:18:42.841141 1938 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" Oct 31 01:18:42.841230 kubelet[1938]: E1031 01:18:42.841171 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d898459cb-gjxrm_calico-system(0849090e-7f9a-48ac-8218-b70639608778)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d898459cb-gjxrm_calico-system(0849090e-7f9a-48ac-8218-b70639608778)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:18:43.605679 kubelet[1938]: I1031 01:18:43.605646 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:43.606580 env[1202]: time="2025-10-31T01:18:43.606400938Z" level=info msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" Oct 31 01:18:43.607681 kubelet[1938]: I1031 01:18:43.607642 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:43.608073 env[1202]: time="2025-10-31T01:18:43.608050708Z" level=info msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" Oct 31 01:18:43.608960 kubelet[1938]: I1031 01:18:43.608934 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:43.609720 env[1202]: time="2025-10-31T01:18:43.609693506Z" level=info msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" Oct 31 01:18:43.610605 kubelet[1938]: I1031 01:18:43.610577 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:43.611041 env[1202]: time="2025-10-31T01:18:43.610998757Z" level=info msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" Oct 31 01:18:43.612169 kubelet[1938]: I1031 01:18:43.611724 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:43.612373 env[1202]: time="2025-10-31T01:18:43.612345486Z" level=info msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" Oct 31 01:18:43.613539 kubelet[1938]: I1031 01:18:43.613515 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:43.615460 env[1202]: time="2025-10-31T01:18:43.615386450Z" level=info msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" Oct 31 01:18:43.616133 kubelet[1938]: I1031 01:18:43.616104 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:43.616665 env[1202]: time="2025-10-31T01:18:43.616619214Z" level=info msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" Oct 31 01:18:43.617390 kubelet[1938]: I1031 01:18:43.617354 1938 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:43.618172 env[1202]: time="2025-10-31T01:18:43.618142587Z" level=info msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" Oct 31 01:18:43.653335 env[1202]: time="2025-10-31T01:18:43.653282291Z" level=error msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" failed" error="failed to destroy network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.653593 env[1202]: time="2025-10-31T01:18:43.653359146Z" level=error msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" failed" error="failed to destroy network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.653881 kubelet[1938]: E1031 01:18:43.653834 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:43.653999 kubelet[1938]: E1031 01:18:43.653904 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148"} Oct 31 01:18:43.653999 kubelet[1938]: E1031 01:18:43.653956 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"69bb3f27-4922-4932-a7d6-aa046762d839\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.653999 kubelet[1938]: E1031 01:18:43.653977 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"69bb3f27-4922-4932-a7d6-aa046762d839\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:18:43.654141 kubelet[1938]: E1031 01:18:43.654004 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:43.654141 kubelet[1938]: E1031 01:18:43.654035 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4"} Oct 31 01:18:43.654141 kubelet[1938]: E1031 01:18:43.654056 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c87c79af-530b-425e-a78b-abdafda90897\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.654141 kubelet[1938]: E1031 01:18:43.654076 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c87c79af-530b-425e-a78b-abdafda90897\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:18:43.657786 env[1202]: time="2025-10-31T01:18:43.657725939Z" level=error msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" failed" error="failed to destroy network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.657943 kubelet[1938]: E1031 01:18:43.657904 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:43.657943 kubelet[1938]: E1031 01:18:43.657933 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b"} Oct 31 01:18:43.658036 kubelet[1938]: E1031 01:18:43.657963 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c563bd83-bb8b-4ae5-aacd-c471087df722\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.658036 kubelet[1938]: E1031 01:18:43.657980 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c563bd83-bb8b-4ae5-aacd-c471087df722\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jhtwg" podUID="c563bd83-bb8b-4ae5-aacd-c471087df722" Oct 31 01:18:43.665294 env[1202]: time="2025-10-31T01:18:43.665259213Z" level=error msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" failed" error="failed to destroy network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.665533 kubelet[1938]: E1031 01:18:43.665501 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:43.665605 kubelet[1938]: E1031 01:18:43.665536 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6"} Oct 31 01:18:43.665605 kubelet[1938]: E1031 01:18:43.665565 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a85f13d0-1c09-4bed-b439-c5aa71c1b595\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.665605 kubelet[1938]: E1031 01:18:43.665587 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a85f13d0-1c09-4bed-b439-c5aa71c1b595\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:18:43.668239 env[1202]: time="2025-10-31T01:18:43.668192553Z" level=error msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" failed" error="failed to destroy network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.668381 kubelet[1938]: E1031 01:18:43.668355 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:43.668381 kubelet[1938]: E1031 01:18:43.668381 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d"} Oct 31 01:18:43.668479 kubelet[1938]: E1031 01:18:43.668400 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2219756-4569-4e7b-baa1-ed625e289d0f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.668479 kubelet[1938]: E1031 01:18:43.668429 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2219756-4569-4e7b-baa1-ed625e289d0f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7f875f98bb-ls9l4" podUID="a2219756-4569-4e7b-baa1-ed625e289d0f" Oct 31 01:18:43.671668 env[1202]: time="2025-10-31T01:18:43.671629003Z" level=error msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" failed" error="failed to destroy network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.671962 kubelet[1938]: E1031 01:18:43.671933 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:43.671962 kubelet[1938]: E1031 01:18:43.671960 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab"} Oct 31 01:18:43.672057 kubelet[1938]: E1031 01:18:43.671979 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1ce78460-3484-4444-8dae-aa63d95c2fad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.672057 kubelet[1938]: E1031 01:18:43.671994 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1ce78460-3484-4444-8dae-aa63d95c2fad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:43.673461 env[1202]: time="2025-10-31T01:18:43.673399211Z" level=error msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" failed" error="failed to destroy network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.673572 kubelet[1938]: E1031 01:18:43.673550 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:43.673610 kubelet[1938]: E1031 01:18:43.673572 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b"} Oct 31 01:18:43.673610 kubelet[1938]: E1031 01:18:43.673591 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.673683 kubelet[1938]: E1031 01:18:43.673607 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6wb5j" podUID="988ebf4f-1524-4f14-a6eb-f0cb2327f4d3" Oct 31 01:18:43.682988 env[1202]: time="2025-10-31T01:18:43.682927696Z" level=error msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" failed" error="failed to destroy network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:43.683137 kubelet[1938]: E1031 01:18:43.683109 1938 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:43.683185 kubelet[1938]: E1031 01:18:43.683140 1938 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e"} Oct 31 01:18:43.683185 kubelet[1938]: E1031 01:18:43.683159 1938 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0849090e-7f9a-48ac-8218-b70639608778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:18:43.683185 kubelet[1938]: E1031 01:18:43.683180 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0849090e-7f9a-48ac-8218-b70639608778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:18:47.204758 systemd[1]: Started sshd@7-10.0.0.142:22-10.0.0.1:46440.service. Oct 31 01:18:47.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.142:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:47.208788 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 01:18:47.208845 kernel: audit: type=1130 audit(1761873527.204:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.142:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:47.242000 audit[3110]: USER_ACCT pid=3110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.243073 sshd[3110]: Accepted publickey for core from 10.0.0.1 port 46440 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:47.249000 audit[3110]: CRED_ACQ pid=3110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.250028 sshd[3110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:47.254366 systemd[1]: Started session-8.scope. Oct 31 01:18:47.254873 systemd-logind[1193]: New session 8 of user core. Oct 31 01:18:47.255889 kernel: audit: type=1101 audit(1761873527.242:996): pid=3110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.256017 kernel: audit: type=1103 audit(1761873527.249:997): pid=3110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.256037 kernel: audit: type=1006 audit(1761873527.249:998): pid=3110 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 31 01:18:47.249000 audit[3110]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc6f8ed60 a2=3 a3=0 items=0 ppid=1 pid=3110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:47.249000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:47.269873 kernel: audit: type=1300 audit(1761873527.249:998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc6f8ed60 a2=3 a3=0 items=0 ppid=1 pid=3110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:47.269908 kernel: audit: type=1327 audit(1761873527.249:998): proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:47.258000 audit[3110]: USER_START pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.277046 kernel: audit: type=1105 audit(1761873527.258:999): pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.260000 audit[3112]: CRED_ACQ pid=3112 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.282886 kernel: audit: type=1103 audit(1761873527.260:1000): pid=3112 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.385052 sshd[3110]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:47.385000 audit[3110]: USER_END pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.387649 systemd-logind[1193]: Session 8 logged out. Waiting for processes to exit. Oct 31 01:18:47.388789 systemd[1]: sshd@7-10.0.0.142:22-10.0.0.1:46440.service: Deactivated successfully. Oct 31 01:18:47.389383 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 01:18:47.390392 systemd-logind[1193]: Removed session 8. Oct 31 01:18:47.385000 audit[3110]: CRED_DISP pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.399478 kernel: audit: type=1106 audit(1761873527.385:1001): pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.399526 kernel: audit: type=1104 audit(1761873527.385:1002): pid=3110 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.142:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:48.444467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4106085988.mount: Deactivated successfully. Oct 31 01:18:49.758116 env[1202]: time="2025-10-31T01:18:49.758059515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:49.760522 env[1202]: time="2025-10-31T01:18:49.760501240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:49.762112 env[1202]: time="2025-10-31T01:18:49.762085923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:49.763712 env[1202]: time="2025-10-31T01:18:49.763686957Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:49.764094 env[1202]: time="2025-10-31T01:18:49.764048377Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:18:49.771049 env[1202]: time="2025-10-31T01:18:49.771016894Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:18:49.790592 env[1202]: time="2025-10-31T01:18:49.790538518Z" level=info msg="CreateContainer within sandbox \"f153dfcf23799f6a6933bebc332a739efb557866bd2b96e461614733f7c7eba8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"67186d669ba271c07481c3efdb1d688c2b7f9aae0e41fc68b0fa8a3a43008285\"" Oct 31 01:18:49.791054 env[1202]: time="2025-10-31T01:18:49.791021416Z" level=info msg="StartContainer for \"67186d669ba271c07481c3efdb1d688c2b7f9aae0e41fc68b0fa8a3a43008285\"" Oct 31 01:18:49.806343 systemd[1]: Started cri-containerd-67186d669ba271c07481c3efdb1d688c2b7f9aae0e41fc68b0fa8a3a43008285.scope. Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f0114bb5ba8 items=0 ppid=2432 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:49.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637313836643636396261323731633037343831633365666462316436 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit: BPF prog-id=136 op=LOAD Oct 31 01:18:49.822000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000308db8 items=0 ppid=2432 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:49.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637313836643636396261323731633037343831633365666462316436 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit: BPF prog-id=137 op=LOAD Oct 31 01:18:49.822000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000308e08 items=0 ppid=2432 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:49.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637313836643636396261323731633037343831633365666462316436 Oct 31 01:18:49.822000 audit: BPF prog-id=137 op=UNLOAD Oct 31 01:18:49.822000 audit: BPF prog-id=136 op=UNLOAD Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:49.822000 audit: BPF prog-id=138 op=LOAD Oct 31 01:18:49.822000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000308e98 items=0 ppid=2432 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:49.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637313836643636396261323731633037343831633365666462316436 Oct 31 01:18:49.893344 env[1202]: time="2025-10-31T01:18:49.893275411Z" level=info msg="StartContainer for \"67186d669ba271c07481c3efdb1d688c2b7f9aae0e41fc68b0fa8a3a43008285\" returns successfully" Oct 31 01:18:49.928773 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:18:49.928910 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:18:50.000702 env[1202]: time="2025-10-31T01:18:50.000666424Z" level=info msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.059 [INFO][3188] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.060 [INFO][3188] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" iface="eth0" netns="/var/run/netns/cni-b44c0612-32a9-940e-e7b8-0bb601da495a" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.060 [INFO][3188] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" iface="eth0" netns="/var/run/netns/cni-b44c0612-32a9-940e-e7b8-0bb601da495a" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.060 [INFO][3188] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" iface="eth0" netns="/var/run/netns/cni-b44c0612-32a9-940e-e7b8-0bb601da495a" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.060 [INFO][3188] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.060 [INFO][3188] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.105 [INFO][3197] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.105 [INFO][3197] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.105 [INFO][3197] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.112 [WARNING][3197] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.112 [INFO][3197] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.113 [INFO][3197] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:50.116108 env[1202]: 2025-10-31 01:18:50.114 [INFO][3188] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:18:50.116820 env[1202]: time="2025-10-31T01:18:50.116131034Z" level=info msg="TearDown network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" successfully" Oct 31 01:18:50.116820 env[1202]: time="2025-10-31T01:18:50.116160799Z" level=info msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" returns successfully" Oct 31 01:18:50.134955 kubelet[1938]: I1031 01:18:50.134930 1938 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-ca-bundle\") pod \"a2219756-4569-4e7b-baa1-ed625e289d0f\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " Oct 31 01:18:50.135248 kubelet[1938]: I1031 01:18:50.134962 1938 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-backend-key-pair\") pod \"a2219756-4569-4e7b-baa1-ed625e289d0f\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " Oct 31 01:18:50.135248 kubelet[1938]: I1031 01:18:50.134986 1938 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-r7hdt\" (UniqueName: \"kubernetes.io/projected/a2219756-4569-4e7b-baa1-ed625e289d0f-kube-api-access-r7hdt\") pod \"a2219756-4569-4e7b-baa1-ed625e289d0f\" (UID: \"a2219756-4569-4e7b-baa1-ed625e289d0f\") " Oct 31 01:18:50.135341 kubelet[1938]: I1031 01:18:50.135307 1938 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "a2219756-4569-4e7b-baa1-ed625e289d0f" (UID: "a2219756-4569-4e7b-baa1-ed625e289d0f"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 31 01:18:50.137812 kubelet[1938]: I1031 01:18:50.137784 1938 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "a2219756-4569-4e7b-baa1-ed625e289d0f" (UID: "a2219756-4569-4e7b-baa1-ed625e289d0f"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 31 01:18:50.138032 kubelet[1938]: I1031 01:18:50.137999 1938 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a2219756-4569-4e7b-baa1-ed625e289d0f-kube-api-access-r7hdt" (OuterVolumeSpecName: "kube-api-access-r7hdt") pod "a2219756-4569-4e7b-baa1-ed625e289d0f" (UID: "a2219756-4569-4e7b-baa1-ed625e289d0f"). InnerVolumeSpecName "kube-api-access-r7hdt". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 31 01:18:50.235578 kubelet[1938]: I1031 01:18:50.235545 1938 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" Oct 31 01:18:50.235578 kubelet[1938]: I1031 01:18:50.235569 1938 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a2219756-4569-4e7b-baa1-ed625e289d0f-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" Oct 31 01:18:50.235578 kubelet[1938]: I1031 01:18:50.235577 1938 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-r7hdt\" (UniqueName: \"kubernetes.io/projected/a2219756-4569-4e7b-baa1-ed625e289d0f-kube-api-access-r7hdt\") on node \"localhost\" DevicePath \"\"" Oct 31 01:18:50.633135 kubelet[1938]: E1031 01:18:50.633099 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:50.636200 systemd[1]: Removed slice kubepods-besteffort-poda2219756_4569_4e7b_baa1_ed625e289d0f.slice. Oct 31 01:18:50.649912 kubelet[1938]: I1031 01:18:50.649843 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gpjxp" podStartSLOduration=1.59565183 podStartE2EDuration="18.649826796s" podCreationTimestamp="2025-10-31 01:18:32 +0000 UTC" firstStartedPulling="2025-10-31 01:18:32.710684276 +0000 UTC m=+19.242123811" lastFinishedPulling="2025-10-31 01:18:49.764859243 +0000 UTC m=+36.296298777" observedRunningTime="2025-10-31 01:18:50.649721377 +0000 UTC m=+37.181160912" watchObservedRunningTime="2025-10-31 01:18:50.649826796 +0000 UTC m=+37.181266320" Oct 31 01:18:50.704186 systemd[1]: Created slice kubepods-besteffort-pod13e56bda_afc7_45c3_8a15_10fc2e6e0437.slice. Oct 31 01:18:50.742747 kubelet[1938]: I1031 01:18:50.742711 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/13e56bda-afc7-45c3-8a15-10fc2e6e0437-whisker-backend-key-pair\") pod \"whisker-85b86fb98d-wmtnx\" (UID: \"13e56bda-afc7-45c3-8a15-10fc2e6e0437\") " pod="calico-system/whisker-85b86fb98d-wmtnx" Oct 31 01:18:50.742747 kubelet[1938]: I1031 01:18:50.742742 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/13e56bda-afc7-45c3-8a15-10fc2e6e0437-whisker-ca-bundle\") pod \"whisker-85b86fb98d-wmtnx\" (UID: \"13e56bda-afc7-45c3-8a15-10fc2e6e0437\") " pod="calico-system/whisker-85b86fb98d-wmtnx" Oct 31 01:18:50.742948 kubelet[1938]: I1031 01:18:50.742770 1938 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p5lf4\" (UniqueName: \"kubernetes.io/projected/13e56bda-afc7-45c3-8a15-10fc2e6e0437-kube-api-access-p5lf4\") pod \"whisker-85b86fb98d-wmtnx\" (UID: \"13e56bda-afc7-45c3-8a15-10fc2e6e0437\") " pod="calico-system/whisker-85b86fb98d-wmtnx" Oct 31 01:18:50.769497 systemd[1]: run-netns-cni\x2db44c0612\x2d32a9\x2d940e\x2de7b8\x2d0bb601da495a.mount: Deactivated successfully. Oct 31 01:18:50.769590 systemd[1]: var-lib-kubelet-pods-a2219756\x2d4569\x2d4e7b\x2dbaa1\x2ded625e289d0f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dr7hdt.mount: Deactivated successfully. Oct 31 01:18:50.769646 systemd[1]: var-lib-kubelet-pods-a2219756\x2d4569\x2d4e7b\x2dbaa1\x2ded625e289d0f-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 31 01:18:51.007746 env[1202]: time="2025-10-31T01:18:51.007710254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-85b86fb98d-wmtnx,Uid:13e56bda-afc7-45c3-8a15-10fc2e6e0437,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:51.103024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:18:51.103114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif8eb7232fb1: link becomes ready Oct 31 01:18:51.103203 systemd-networkd[1029]: calif8eb7232fb1: Link UP Oct 31 01:18:51.103773 systemd-networkd[1029]: calif8eb7232fb1: Gained carrier Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.035 [INFO][3221] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.045 [INFO][3221] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--85b86fb98d--wmtnx-eth0 whisker-85b86fb98d- calico-system 13e56bda-afc7-45c3-8a15-10fc2e6e0437 939 0 2025-10-31 01:18:50 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:85b86fb98d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-85b86fb98d-wmtnx eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calif8eb7232fb1 [] [] }} ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.045 [INFO][3221] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.064 [INFO][3236] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" HandleID="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Workload="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.064 [INFO][3236] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" HandleID="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Workload="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000118bf0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-85b86fb98d-wmtnx", "timestamp":"2025-10-31 01:18:51.064139409 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.064 [INFO][3236] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.064 [INFO][3236] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.064 [INFO][3236] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.069 [INFO][3236] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.074 [INFO][3236] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.077 [INFO][3236] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.079 [INFO][3236] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.080 [INFO][3236] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.080 [INFO][3236] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.081 [INFO][3236] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43 Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.084 [INFO][3236] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.089 [INFO][3236] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.089 [INFO][3236] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" host="localhost" Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.089 [INFO][3236] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:51.112221 env[1202]: 2025-10-31 01:18:51.089 [INFO][3236] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" HandleID="k8s-pod-network.f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Workload="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.092 [INFO][3221] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--85b86fb98d--wmtnx-eth0", GenerateName:"whisker-85b86fb98d-", Namespace:"calico-system", SelfLink:"", UID:"13e56bda-afc7-45c3-8a15-10fc2e6e0437", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"85b86fb98d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-85b86fb98d-wmtnx", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif8eb7232fb1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.092 [INFO][3221] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.092 [INFO][3221] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif8eb7232fb1 ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.103 [INFO][3221] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.103 [INFO][3221] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--85b86fb98d--wmtnx-eth0", GenerateName:"whisker-85b86fb98d-", Namespace:"calico-system", SelfLink:"", UID:"13e56bda-afc7-45c3-8a15-10fc2e6e0437", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"85b86fb98d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43", Pod:"whisker-85b86fb98d-wmtnx", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calif8eb7232fb1", MAC:"c6:fe:01:03:7e:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:51.112781 env[1202]: 2025-10-31 01:18:51.109 [INFO][3221] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43" Namespace="calico-system" Pod="whisker-85b86fb98d-wmtnx" WorkloadEndpoint="localhost-k8s-whisker--85b86fb98d--wmtnx-eth0" Oct 31 01:18:51.120730 env[1202]: time="2025-10-31T01:18:51.120665386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:51.120730 env[1202]: time="2025-10-31T01:18:51.120706955Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:51.120730 env[1202]: time="2025-10-31T01:18:51.120717605Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:51.120933 env[1202]: time="2025-10-31T01:18:51.120861967Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43 pid=3261 runtime=io.containerd.runc.v2 Oct 31 01:18:51.130532 systemd[1]: Started cri-containerd-f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43.scope. Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit: BPF prog-id=139 op=LOAD Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3261 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353061393164613538393437393764313332343464626630613835 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3261 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353061393164613538393437393764313332343464626630613835 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.139000 audit: BPF prog-id=140 op=LOAD Oct 31 01:18:51.139000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd10 items=0 ppid=3261 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353061393164613538393437393764313332343464626630613835 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit: BPF prog-id=141 op=LOAD Oct 31 01:18:51.140000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd58 items=0 ppid=3261 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353061393164613538393437393764313332343464626630613835 Oct 31 01:18:51.140000 audit: BPF prog-id=141 op=UNLOAD Oct 31 01:18:51.140000 audit: BPF prog-id=140 op=UNLOAD Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:51.140000 audit: BPF prog-id=142 op=LOAD Oct 31 01:18:51.140000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2168 items=0 ppid=3261 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630353061393164613538393437393764313332343464626630613835 Oct 31 01:18:51.141089 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:51.161517 env[1202]: time="2025-10-31T01:18:51.161467441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-85b86fb98d-wmtnx,Uid:13e56bda-afc7-45c3-8a15-10fc2e6e0437,Namespace:calico-system,Attempt:0,} returns sandbox id \"f050a91da5894797d13244dbf0a85a1dca1cfb6c6109223a090eff6abf0d3a43\"" Oct 31 01:18:51.162764 env[1202]: time="2025-10-31T01:18:51.162737120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:18:51.527021 env[1202]: time="2025-10-31T01:18:51.526959753Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:51.528307 env[1202]: time="2025-10-31T01:18:51.528222559Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:18:51.528504 kubelet[1938]: E1031 01:18:51.528461 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:18:51.528740 kubelet[1938]: E1031 01:18:51.528503 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:18:51.529530 kubelet[1938]: E1031 01:18:51.529476 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:668b603cd51348619f3f634744be88b6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:51.531271 env[1202]: time="2025-10-31T01:18:51.531246589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:18:51.538986 kubelet[1938]: I1031 01:18:51.538955 1938 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a2219756-4569-4e7b-baa1-ed625e289d0f" path="/var/lib/kubelet/pods/a2219756-4569-4e7b-baa1-ed625e289d0f/volumes" Oct 31 01:18:51.585000 audit[3389]: AVC avc: denied { write } for pid=3389 comm="tee" name="fd" dev="proc" ino=25931 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.585000 audit[3389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1cd487f1 a2=241 a3=1b6 items=1 ppid=3361 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.585000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:18:51.585000 audit: PATH item=0 name="/dev/fd/63" inode=23980 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.585000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.587000 audit[3377]: AVC avc: denied { write } for pid=3377 comm="tee" name="fd" dev="proc" ino=25937 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.587000 audit[3377]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb8bcc7f1 a2=241 a3=1b6 items=1 ppid=3349 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.587000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:18:51.587000 audit: PATH item=0 name="/dev/fd/63" inode=23973 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.587000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.597000 audit[3394]: AVC avc: denied { write } for pid=3394 comm="tee" name="fd" dev="proc" ino=25949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.597000 audit[3394]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc51d957f3 a2=241 a3=1b6 items=1 ppid=3348 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.597000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:18:51.597000 audit: PATH item=0 name="/dev/fd/63" inode=23981 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.597000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.599000 audit[3414]: AVC avc: denied { write } for pid=3414 comm="tee" name="fd" dev="proc" ino=25954 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.599000 audit[3414]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd101737f2 a2=241 a3=1b6 items=1 ppid=3352 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.599000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:18:51.599000 audit: PATH item=0 name="/dev/fd/63" inode=23983 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.599000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.602000 audit[3416]: AVC avc: denied { write } for pid=3416 comm="tee" name="fd" dev="proc" ino=23990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.602000 audit[3416]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde87097e2 a2=241 a3=1b6 items=1 ppid=3354 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.603000 audit[3403]: AVC avc: denied { write } for pid=3403 comm="tee" name="fd" dev="proc" ino=23994 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.604000 audit[3421]: AVC avc: denied { write } for pid=3421 comm="tee" name="fd" dev="proc" ino=23997 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:18:51.603000 audit[3403]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc83ec87e1 a2=241 a3=1b6 items=1 ppid=3347 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.603000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:18:51.603000 audit: PATH item=0 name="/dev/fd/63" inode=25039 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.602000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:18:51.602000 audit: PATH item=0 name="/dev/fd/63" inode=25946 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.604000 audit[3421]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff12e857f1 a2=241 a3=1b6 items=1 ppid=3357 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:51.604000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:18:51.604000 audit: PATH item=0 name="/dev/fd/63" inode=25951 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:51.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:18:51.635982 kubelet[1938]: E1031 01:18:51.635599 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:51.861303 env[1202]: time="2025-10-31T01:18:51.861174050Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:51.862273 env[1202]: time="2025-10-31T01:18:51.862238231Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:18:51.862453 kubelet[1938]: E1031 01:18:51.862397 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:18:51.862453 kubelet[1938]: E1031 01:18:51.862454 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:18:51.862644 kubelet[1938]: E1031 01:18:51.862554 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:51.863735 kubelet[1938]: E1031 01:18:51.863692 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:18:52.388769 systemd[1]: Started sshd@8-10.0.0.142:22-10.0.0.1:60864.service. Oct 31 01:18:52.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.142:22-10.0.0.1:60864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:52.391343 kernel: kauditd_printk_skb: 136 callbacks suppressed Oct 31 01:18:52.391396 kernel: audit: type=1130 audit(1761873532.388:1035): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.142:22-10.0.0.1:60864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:52.426000 audit[3461]: USER_ACCT pid=3461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.427050 sshd[3461]: Accepted publickey for core from 10.0.0.1 port 60864 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:52.428586 sshd[3461]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:52.432897 systemd[1]: Started session-9.scope. Oct 31 01:18:52.433170 systemd-logind[1193]: New session 9 of user core. Oct 31 01:18:52.427000 audit[3461]: CRED_ACQ pid=3461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.441344 kernel: audit: type=1101 audit(1761873532.426:1036): pid=3461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.441388 kernel: audit: type=1103 audit(1761873532.427:1037): pid=3461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.441424 kernel: audit: type=1006 audit(1761873532.427:1038): pid=3461 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 31 01:18:52.427000 audit[3461]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd43a90670 a2=3 a3=0 items=0 ppid=1 pid=3461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.452266 kernel: audit: type=1300 audit(1761873532.427:1038): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd43a90670 a2=3 a3=0 items=0 ppid=1 pid=3461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.452313 kernel: audit: type=1327 audit(1761873532.427:1038): proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:52.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:52.437000 audit[3461]: USER_START pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.461743 kernel: audit: type=1105 audit(1761873532.437:1039): pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.461780 kernel: audit: type=1103 audit(1761873532.438:1040): pid=3463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.438000 audit[3463]: CRED_ACQ pid=3463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.540112 sshd[3461]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:52.540000 audit[3461]: USER_END pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.542437 systemd[1]: sshd@8-10.0.0.142:22-10.0.0.1:60864.service: Deactivated successfully. Oct 31 01:18:52.543092 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 01:18:52.543729 systemd-logind[1193]: Session 9 logged out. Waiting for processes to exit. Oct 31 01:18:52.544392 systemd-logind[1193]: Removed session 9. Oct 31 01:18:52.540000 audit[3461]: CRED_DISP pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.554227 kernel: audit: type=1106 audit(1761873532.540:1041): pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.554288 kernel: audit: type=1104 audit(1761873532.540:1042): pid=3461 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:52.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.142:22-10.0.0.1:60864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:52.637448 kubelet[1938]: E1031 01:18:52.637403 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:52.639212 kubelet[1938]: E1031 01:18:52.639089 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:18:52.654645 systemd[1]: run-containerd-runc-k8s.io-67186d669ba271c07481c3efdb1d688c2b7f9aae0e41fc68b0fa8a3a43008285-runc.SMkwyw.mount: Deactivated successfully. Oct 31 01:18:52.660000 audit[3488]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=3488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:52.660000 audit[3488]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffeca109e10 a2=0 a3=7ffeca109dfc items=0 ppid=2045 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:52.665000 audit[3488]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:52.665000 audit[3488]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeca109e10 a2=0 a3=0 items=0 ppid=2045 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:52.756610 systemd-networkd[1029]: calif8eb7232fb1: Gained IPv6LL Oct 31 01:18:54.538444 env[1202]: time="2025-10-31T01:18:54.538377666Z" level=info msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.575 [INFO][3557] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.575 [INFO][3557] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" iface="eth0" netns="/var/run/netns/cni-c5bb1e33-98a6-b367-da30-100f3889a8ad" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.575 [INFO][3557] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" iface="eth0" netns="/var/run/netns/cni-c5bb1e33-98a6-b367-da30-100f3889a8ad" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.575 [INFO][3557] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" iface="eth0" netns="/var/run/netns/cni-c5bb1e33-98a6-b367-da30-100f3889a8ad" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.576 [INFO][3557] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.576 [INFO][3557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.593 [INFO][3565] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.594 [INFO][3565] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.594 [INFO][3565] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.600 [WARNING][3565] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.600 [INFO][3565] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.603 [INFO][3565] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:54.606665 env[1202]: 2025-10-31 01:18:54.605 [INFO][3557] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:18:54.607080 env[1202]: time="2025-10-31T01:18:54.606819669Z" level=info msg="TearDown network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" successfully" Oct 31 01:18:54.607080 env[1202]: time="2025-10-31T01:18:54.606849135Z" level=info msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" returns successfully" Oct 31 01:18:54.607482 env[1202]: time="2025-10-31T01:18:54.607458260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-r2d8s,Uid:69bb3f27-4922-4932-a7d6-aa046762d839,Namespace:calico-apiserver,Attempt:1,}" Oct 31 01:18:54.608812 systemd[1]: run-netns-cni\x2dc5bb1e33\x2d98a6\x2db367\x2dda30\x2d100f3889a8ad.mount: Deactivated successfully. Oct 31 01:18:54.695072 systemd-networkd[1029]: calid8633940da1: Link UP Oct 31 01:18:54.699031 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:18:54.699120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8633940da1: link becomes ready Oct 31 01:18:54.699202 systemd-networkd[1029]: calid8633940da1: Gained carrier Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.638 [INFO][3576] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.648 [INFO][3576] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0 calico-apiserver-f875b9d54- calico-apiserver 69bb3f27-4922-4932-a7d6-aa046762d839 992 0 2025-10-31 01:18:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f875b9d54 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-f875b9d54-r2d8s eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid8633940da1 [] [] }} ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.648 [INFO][3576] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.667 [INFO][3591] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" HandleID="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.667 [INFO][3591] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" HandleID="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f700), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-f875b9d54-r2d8s", "timestamp":"2025-10-31 01:18:54.667621767 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.667 [INFO][3591] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.667 [INFO][3591] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.667 [INFO][3591] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.674 [INFO][3591] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.677 [INFO][3591] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.680 [INFO][3591] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.682 [INFO][3591] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.683 [INFO][3591] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.683 [INFO][3591] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.684 [INFO][3591] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2 Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.687 [INFO][3591] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.692 [INFO][3591] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.692 [INFO][3591] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" host="localhost" Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.692 [INFO][3591] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:54.711490 env[1202]: 2025-10-31 01:18:54.692 [INFO][3591] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" HandleID="k8s-pod-network.e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.693 [INFO][3576] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"69bb3f27-4922-4932-a7d6-aa046762d839", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-f875b9d54-r2d8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8633940da1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.694 [INFO][3576] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.694 [INFO][3576] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid8633940da1 ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.701 [INFO][3576] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.701 [INFO][3576] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"69bb3f27-4922-4932-a7d6-aa046762d839", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2", Pod:"calico-apiserver-f875b9d54-r2d8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8633940da1", MAC:"b6:a8:85:4c:4f:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:54.712100 env[1202]: 2025-10-31 01:18:54.709 [INFO][3576] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-r2d8s" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:18:54.720301 env[1202]: time="2025-10-31T01:18:54.720217163Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:54.720301 env[1202]: time="2025-10-31T01:18:54.720282486Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:54.720373 env[1202]: time="2025-10-31T01:18:54.720295019Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:54.720630 env[1202]: time="2025-10-31T01:18:54.720567132Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2 pid=3615 runtime=io.containerd.runc.v2 Oct 31 01:18:54.732989 systemd[1]: Started cri-containerd-e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2.scope. Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.741000 audit: BPF prog-id=143 op=LOAD Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3615 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353035626465623431333562326330323536653437306661353661 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3615 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353035626465623431333562326330323536653437306661353661 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit: BPF prog-id=144 op=LOAD Oct 31 01:18:54.742000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028a960 items=0 ppid=3615 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353035626465623431333562326330323536653437306661353661 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit: BPF prog-id=145 op=LOAD Oct 31 01:18:54.742000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028a9a8 items=0 ppid=3615 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353035626465623431333562326330323536653437306661353661 Oct 31 01:18:54.742000 audit: BPF prog-id=145 op=UNLOAD Oct 31 01:18:54.742000 audit: BPF prog-id=144 op=UNLOAD Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:54.742000 audit: BPF prog-id=146 op=LOAD Oct 31 01:18:54.742000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028adb8 items=0 ppid=3615 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534353035626465623431333562326330323536653437306661353661 Oct 31 01:18:54.743595 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:54.766889 env[1202]: time="2025-10-31T01:18:54.766849567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-r2d8s,Uid:69bb3f27-4922-4932-a7d6-aa046762d839,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2\"" Oct 31 01:18:54.768405 env[1202]: time="2025-10-31T01:18:54.768387329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:18:55.091732 env[1202]: time="2025-10-31T01:18:55.091665038Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:55.092863 env[1202]: time="2025-10-31T01:18:55.092813557Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:18:55.093074 kubelet[1938]: E1031 01:18:55.093042 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:18:55.093311 kubelet[1938]: E1031 01:18:55.093080 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:18:55.093311 kubelet[1938]: E1031 01:18:55.093199 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mqst5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-f875b9d54-r2d8s_calico-apiserver(69bb3f27-4922-4932-a7d6-aa046762d839): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:55.094441 kubelet[1938]: E1031 01:18:55.094399 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:18:55.537849 env[1202]: time="2025-10-31T01:18:55.537808645Z" level=info msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" Oct 31 01:18:55.538158 env[1202]: time="2025-10-31T01:18:55.538127495Z" level=info msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" Oct 31 01:18:55.644425 kubelet[1938]: E1031 01:18:55.644355 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:18:55.892583 systemd-networkd[1029]: calid8633940da1: Gained IPv6LL Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.948 [INFO][3695] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.948 [INFO][3695] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" iface="eth0" netns="/var/run/netns/cni-c6535018-f1a1-eba2-fc16-6670dc7e22a5" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.949 [INFO][3695] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" iface="eth0" netns="/var/run/netns/cni-c6535018-f1a1-eba2-fc16-6670dc7e22a5" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.949 [INFO][3695] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" iface="eth0" netns="/var/run/netns/cni-c6535018-f1a1-eba2-fc16-6670dc7e22a5" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.949 [INFO][3695] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.949 [INFO][3695] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.975 [INFO][3733] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.975 [INFO][3733] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:55.975 [INFO][3733] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:56.089 [WARNING][3733] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:56.089 [INFO][3733] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:56.094 [INFO][3733] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.097076 env[1202]: 2025-10-31 01:18:56.095 [INFO][3695] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:18:56.100065 systemd[1]: run-netns-cni\x2dc6535018\x2df1a1\x2deba2\x2dfc16\x2d6670dc7e22a5.mount: Deactivated successfully. Oct 31 01:18:56.101596 env[1202]: time="2025-10-31T01:18:56.101548434Z" level=info msg="TearDown network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" successfully" Oct 31 01:18:56.101690 env[1202]: time="2025-10-31T01:18:56.101669201Z" level=info msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" returns successfully" Oct 31 01:18:56.102382 env[1202]: time="2025-10-31T01:18:56.102361051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-p6cd4,Uid:c87c79af-530b-425e-a78b-abdafda90897,Namespace:calico-system,Attempt:1,}" Oct 31 01:18:56.105000 audit[3750]: NETFILTER_CFG table=filter:103 family=2 entries=22 op=nft_register_rule pid=3750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.105000 audit[3750]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffffb1c1040 a2=0 a3=7ffffb1c102c items=0 ppid=2045 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.109000 audit[3750]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.109000 audit[3750]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffffb1c1040 a2=0 a3=0 items=0 ppid=2045 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.090 [INFO][3696] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.090 [INFO][3696] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" iface="eth0" netns="/var/run/netns/cni-e0d36bdf-5384-1bff-67e4-705f11174a64" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.091 [INFO][3696] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" iface="eth0" netns="/var/run/netns/cni-e0d36bdf-5384-1bff-67e4-705f11174a64" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.091 [INFO][3696] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" iface="eth0" netns="/var/run/netns/cni-e0d36bdf-5384-1bff-67e4-705f11174a64" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.091 [INFO][3696] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.091 [INFO][3696] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.117 [INFO][3743] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.117 [INFO][3743] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.117 [INFO][3743] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.132 [WARNING][3743] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.132 [INFO][3743] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.135 [INFO][3743] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.140070 env[1202]: 2025-10-31 01:18:56.138 [INFO][3696] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:18:56.140531 env[1202]: time="2025-10-31T01:18:56.140222811Z" level=info msg="TearDown network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" successfully" Oct 31 01:18:56.140531 env[1202]: time="2025-10-31T01:18:56.140284186Z" level=info msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" returns successfully" Oct 31 01:18:56.142371 systemd[1]: run-netns-cni\x2de0d36bdf\x2d5384\x2d1bff\x2d67e4\x2d705f11174a64.mount: Deactivated successfully. Oct 31 01:18:56.143819 env[1202]: time="2025-10-31T01:18:56.143730124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d898459cb-gjxrm,Uid:0849090e-7f9a-48ac-8218-b70639608778,Namespace:calico-system,Attempt:1,}" Oct 31 01:18:56.245595 systemd-networkd[1029]: cali924bb654f63: Link UP Oct 31 01:18:56.249151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:18:56.249302 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali924bb654f63: link becomes ready Oct 31 01:18:56.249529 systemd-networkd[1029]: cali924bb654f63: Gained carrier Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.153 [INFO][3752] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.166 [INFO][3752] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--666569f655--p6cd4-eth0 goldmane-666569f655- calico-system c87c79af-530b-425e-a78b-abdafda90897 1008 0 2025-10-31 01:18:30 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-666569f655-p6cd4 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali924bb654f63 [] [] }} ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.166 [INFO][3752] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.202 [INFO][3779] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" HandleID="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.202 [INFO][3779] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" HandleID="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000139e00), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-666569f655-p6cd4", "timestamp":"2025-10-31 01:18:56.202124409 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.202 [INFO][3779] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.202 [INFO][3779] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.202 [INFO][3779] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.212 [INFO][3779] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.219 [INFO][3779] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.223 [INFO][3779] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.225 [INFO][3779] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.227 [INFO][3779] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.227 [INFO][3779] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.228 [INFO][3779] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.231 [INFO][3779] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.238 [INFO][3779] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.239 [INFO][3779] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" host="localhost" Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.239 [INFO][3779] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.263446 env[1202]: 2025-10-31 01:18:56.239 [INFO][3779] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" HandleID="k8s-pod-network.92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.243 [INFO][3752] cni-plugin/k8s.go 418: Populated endpoint ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--p6cd4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c87c79af-530b-425e-a78b-abdafda90897", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-666569f655-p6cd4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali924bb654f63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.243 [INFO][3752] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.243 [INFO][3752] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali924bb654f63 ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.249 [INFO][3752] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.249 [INFO][3752] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--p6cd4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c87c79af-530b-425e-a78b-abdafda90897", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb", Pod:"goldmane-666569f655-p6cd4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali924bb654f63", MAC:"82:fa:da:29:27:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.264306 env[1202]: 2025-10-31 01:18:56.261 [INFO][3752] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb" Namespace="calico-system" Pod="goldmane-666569f655-p6cd4" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:18:56.272737 env[1202]: time="2025-10-31T01:18:56.272679613Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:56.272737 env[1202]: time="2025-10-31T01:18:56.272716172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:56.272737 env[1202]: time="2025-10-31T01:18:56.272726592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:56.272968 env[1202]: time="2025-10-31T01:18:56.272892333Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb pid=3810 runtime=io.containerd.runc.v2 Oct 31 01:18:56.283585 systemd[1]: Started cri-containerd-92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb.scope. Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit: BPF prog-id=147 op=LOAD Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932343435643331343461353634363163396166333632316536303865 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932343435643331343461353634363163396166333632316536303865 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.293000 audit: BPF prog-id=148 op=LOAD Oct 31 01:18:56.293000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002171b0 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932343435643331343461353634363163396166333632316536303865 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit: BPF prog-id=149 op=LOAD Oct 31 01:18:56.294000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002171f8 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932343435643331343461353634363163396166333632316536303865 Oct 31 01:18:56.294000 audit: BPF prog-id=149 op=UNLOAD Oct 31 01:18:56.294000 audit: BPF prog-id=148 op=UNLOAD Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.294000 audit: BPF prog-id=150 op=LOAD Oct 31 01:18:56.294000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000217608 items=0 ppid=3810 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932343435643331343461353634363163396166333632316536303865 Oct 31 01:18:56.295153 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:56.316064 env[1202]: time="2025-10-31T01:18:56.316031282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-p6cd4,Uid:c87c79af-530b-425e-a78b-abdafda90897,Namespace:calico-system,Attempt:1,} returns sandbox id \"92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb\"" Oct 31 01:18:56.318182 env[1202]: time="2025-10-31T01:18:56.318113556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:18:56.338630 systemd-networkd[1029]: calicc792e46cf4: Link UP Oct 31 01:18:56.341592 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc792e46cf4: link becomes ready Oct 31 01:18:56.341403 systemd-networkd[1029]: calicc792e46cf4: Gained carrier Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.177 [INFO][3771] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.188 [INFO][3771] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0 calico-kube-controllers-5d898459cb- calico-system 0849090e-7f9a-48ac-8218-b70639608778 1012 0 2025-10-31 01:18:32 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d898459cb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5d898459cb-gjxrm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicc792e46cf4 [] [] }} ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.188 [INFO][3771] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.217 [INFO][3787] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" HandleID="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.217 [INFO][3787] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" HandleID="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bc190), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5d898459cb-gjxrm", "timestamp":"2025-10-31 01:18:56.217694927 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.217 [INFO][3787] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.239 [INFO][3787] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.239 [INFO][3787] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.313 [INFO][3787] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.317 [INFO][3787] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.323 [INFO][3787] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.324 [INFO][3787] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.326 [INFO][3787] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.326 [INFO][3787] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.327 [INFO][3787] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3 Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.330 [INFO][3787] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.334 [INFO][3787] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.334 [INFO][3787] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" host="localhost" Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.335 [INFO][3787] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.354489 env[1202]: 2025-10-31 01:18:56.335 [INFO][3787] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" HandleID="k8s-pod-network.2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.337 [INFO][3771] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0", GenerateName:"calico-kube-controllers-5d898459cb-", Namespace:"calico-system", SelfLink:"", UID:"0849090e-7f9a-48ac-8218-b70639608778", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d898459cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5d898459cb-gjxrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc792e46cf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.337 [INFO][3771] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.337 [INFO][3771] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicc792e46cf4 ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.340 [INFO][3771] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.344 [INFO][3771] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0", GenerateName:"calico-kube-controllers-5d898459cb-", Namespace:"calico-system", SelfLink:"", UID:"0849090e-7f9a-48ac-8218-b70639608778", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d898459cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3", Pod:"calico-kube-controllers-5d898459cb-gjxrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc792e46cf4", MAC:"1e:36:8b:fa:a1:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.355093 env[1202]: 2025-10-31 01:18:56.352 [INFO][3771] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3" Namespace="calico-system" Pod="calico-kube-controllers-5d898459cb-gjxrm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:18:56.364758 env[1202]: time="2025-10-31T01:18:56.364684868Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:56.364758 env[1202]: time="2025-10-31T01:18:56.364727127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:56.364758 env[1202]: time="2025-10-31T01:18:56.364737507Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:56.364960 env[1202]: time="2025-10-31T01:18:56.364898359Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3 pid=3858 runtime=io.containerd.runc.v2 Oct 31 01:18:56.375233 systemd[1]: Started cri-containerd-2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3.scope. Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit: BPF prog-id=151 op=LOAD Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3858 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356565393536636138393037313566303365353966356633396538 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3858 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356565393536636138393037313566303365353966356633396538 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit: BPF prog-id=152 op=LOAD Oct 31 01:18:56.385000 audit[3868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021d500 items=0 ppid=3858 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356565393536636138393037313566303365353966356633396538 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit: BPF prog-id=153 op=LOAD Oct 31 01:18:56.385000 audit[3868]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021d548 items=0 ppid=3858 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356565393536636138393037313566303365353966356633396538 Oct 31 01:18:56.385000 audit: BPF prog-id=153 op=UNLOAD Oct 31 01:18:56.385000 audit: BPF prog-id=152 op=UNLOAD Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.385000 audit: BPF prog-id=154 op=LOAD Oct 31 01:18:56.385000 audit[3868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021d958 items=0 ppid=3858 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356565393536636138393037313566303365353966356633396538 Oct 31 01:18:56.386888 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:56.407914 env[1202]: time="2025-10-31T01:18:56.407820681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d898459cb-gjxrm,Uid:0849090e-7f9a-48ac-8218-b70639608778,Namespace:calico-system,Attempt:1,} returns sandbox id \"2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3\"" Oct 31 01:18:56.537677 env[1202]: time="2025-10-31T01:18:56.537636129Z" level=info msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.572 [INFO][3902] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.572 [INFO][3902] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" iface="eth0" netns="/var/run/netns/cni-aa7b9497-053a-9d88-f033-fecad918d887" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.573 [INFO][3902] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" iface="eth0" netns="/var/run/netns/cni-aa7b9497-053a-9d88-f033-fecad918d887" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.573 [INFO][3902] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" iface="eth0" netns="/var/run/netns/cni-aa7b9497-053a-9d88-f033-fecad918d887" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.573 [INFO][3902] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.573 [INFO][3902] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.590 [INFO][3911] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.590 [INFO][3911] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.590 [INFO][3911] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.595 [WARNING][3911] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.595 [INFO][3911] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.599 [INFO][3911] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.603127 env[1202]: 2025-10-31 01:18:56.601 [INFO][3902] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:18:56.603538 env[1202]: time="2025-10-31T01:18:56.603228213Z" level=info msg="TearDown network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" successfully" Oct 31 01:18:56.603538 env[1202]: time="2025-10-31T01:18:56.603256457Z" level=info msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" returns successfully" Oct 31 01:18:56.603899 env[1202]: time="2025-10-31T01:18:56.603865571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mxv8z,Uid:1ce78460-3484-4444-8dae-aa63d95c2fad,Namespace:calico-system,Attempt:1,}" Oct 31 01:18:56.648693 kubelet[1938]: E1031 01:18:56.648436 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:18:56.655030 env[1202]: time="2025-10-31T01:18:56.654910041Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:56.657222 env[1202]: time="2025-10-31T01:18:56.657184907Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:18:56.657787 kubelet[1938]: E1031 01:18:56.657467 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:18:56.657787 kubelet[1938]: E1031 01:18:56.657506 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:18:56.657787 kubelet[1938]: E1031 01:18:56.657710 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzf5k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-p6cd4_calico-system(c87c79af-530b-425e-a78b-abdafda90897): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:56.659637 kubelet[1938]: E1031 01:18:56.659342 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:18:56.660243 env[1202]: time="2025-10-31T01:18:56.660221215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:18:56.701823 systemd-networkd[1029]: cali63bb5990cca: Link UP Oct 31 01:18:56.703809 systemd-networkd[1029]: cali63bb5990cca: Gained carrier Oct 31 01:18:56.704433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali63bb5990cca: link becomes ready Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.632 [INFO][3921] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.641 [INFO][3921] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--mxv8z-eth0 csi-node-driver- calico-system 1ce78460-3484-4444-8dae-aa63d95c2fad 1025 0 2025-10-31 01:18:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-mxv8z eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali63bb5990cca [] [] }} ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.641 [INFO][3921] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.673 [INFO][3937] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" HandleID="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.673 [INFO][3937] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" HandleID="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000529410), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-mxv8z", "timestamp":"2025-10-31 01:18:56.673338581 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.673 [INFO][3937] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.673 [INFO][3937] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.673 [INFO][3937] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.679 [INFO][3937] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.683 [INFO][3937] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.686 [INFO][3937] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.687 [INFO][3937] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.689 [INFO][3937] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.689 [INFO][3937] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.690 [INFO][3937] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1 Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.694 [INFO][3937] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.698 [INFO][3937] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.698 [INFO][3937] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" host="localhost" Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.698 [INFO][3937] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:56.714536 env[1202]: 2025-10-31 01:18:56.698 [INFO][3937] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" HandleID="k8s-pod-network.7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.700 [INFO][3921] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mxv8z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ce78460-3484-4444-8dae-aa63d95c2fad", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-mxv8z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63bb5990cca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.700 [INFO][3921] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.700 [INFO][3921] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali63bb5990cca ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.705 [INFO][3921] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.705 [INFO][3921] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mxv8z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ce78460-3484-4444-8dae-aa63d95c2fad", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1", Pod:"csi-node-driver-mxv8z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63bb5990cca", MAC:"1a:a0:68:d7:35:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:56.715098 env[1202]: 2025-10-31 01:18:56.712 [INFO][3921] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1" Namespace="calico-system" Pod="csi-node-driver-mxv8z" WorkloadEndpoint="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:18:56.722620 env[1202]: time="2025-10-31T01:18:56.722498628Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:56.722620 env[1202]: time="2025-10-31T01:18:56.722535468Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:56.722620 env[1202]: time="2025-10-31T01:18:56.722545227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:56.722769 env[1202]: time="2025-10-31T01:18:56.722720345Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1 pid=3957 runtime=io.containerd.runc.v2 Oct 31 01:18:56.732728 systemd[1]: Started cri-containerd-7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1.scope. Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit: BPF prog-id=155 op=LOAD Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3957 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765653134343734373763623932373532383564656664643036303130 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3957 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765653134343734373763623932373532383564656664643036303130 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.743000 audit: BPF prog-id=156 op=LOAD Oct 31 01:18:56.743000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c05f0 items=0 ppid=3957 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765653134343734373763623932373532383564656664643036303130 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit: BPF prog-id=157 op=LOAD Oct 31 01:18:56.744000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c0638 items=0 ppid=3957 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765653134343734373763623932373532383564656664643036303130 Oct 31 01:18:56.744000 audit: BPF prog-id=157 op=UNLOAD Oct 31 01:18:56.744000 audit: BPF prog-id=156 op=UNLOAD Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:56.744000 audit: BPF prog-id=158 op=LOAD Oct 31 01:18:56.744000 audit[3968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c0a48 items=0 ppid=3957 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765653134343734373763623932373532383564656664643036303130 Oct 31 01:18:56.745431 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:56.754729 env[1202]: time="2025-10-31T01:18:56.754673018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mxv8z,Uid:1ce78460-3484-4444-8dae-aa63d95c2fad,Namespace:calico-system,Attempt:1,} returns sandbox id \"7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1\"" Oct 31 01:18:56.996133 env[1202]: time="2025-10-31T01:18:56.996079916Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:57.061366 env[1202]: time="2025-10-31T01:18:57.061289075Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:18:57.061560 kubelet[1938]: E1031 01:18:57.061520 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:18:57.061608 kubelet[1938]: E1031 01:18:57.061568 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:18:57.061911 kubelet[1938]: E1031 01:18:57.061831 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5sppz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5d898459cb-gjxrm_calico-system(0849090e-7f9a-48ac-8218-b70639608778): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:57.062050 env[1202]: time="2025-10-31T01:18:57.061890785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:18:57.063401 kubelet[1938]: E1031 01:18:57.063356 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:18:57.086194 kubelet[1938]: I1031 01:18:57.086169 1938 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 01:18:57.086497 kubelet[1938]: E1031 01:18:57.086472 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:57.102655 systemd[1]: run-netns-cni\x2daa7b9497\x2d053a\x2d9d88\x2df033\x2dfecad918d887.mount: Deactivated successfully. Oct 31 01:18:57.246000 audit[4013]: NETFILTER_CFG table=filter:105 family=2 entries=21 op=nft_register_rule pid=4013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.246000 audit[4013]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd455f8b30 a2=0 a3=7ffd455f8b1c items=0 ppid=2045 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.255000 audit[4013]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=4013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.255000 audit[4013]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd455f8b30 a2=0 a3=7ffd455f8b1c items=0 ppid=2045 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.369000 audit: BPF prog-id=159 op=LOAD Oct 31 01:18:57.369000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0d16b350 a2=98 a3=1fffffffffffffff items=0 ppid=4014 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.369000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:18:57.369000 audit: BPF prog-id=159 op=UNLOAD Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit: BPF prog-id=160 op=LOAD Oct 31 01:18:57.370000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0d16b230 a2=94 a3=3 items=0 ppid=4014 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.370000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:18:57.370000 audit: BPF prog-id=160 op=UNLOAD Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit: BPF prog-id=161 op=LOAD Oct 31 01:18:57.370000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0d16b270 a2=94 a3=7ffc0d16b450 items=0 ppid=4014 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.370000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:18:57.370000 audit: BPF prog-id=161 op=UNLOAD Oct 31 01:18:57.370000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.370000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc0d16b340 a2=50 a3=a000000085 items=0 ppid=4014 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.370000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit: BPF prog-id=162 op=LOAD Oct 31 01:18:57.371000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb1d6d0c0 a2=98 a3=3 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.371000 audit: BPF prog-id=162 op=UNLOAD Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit: BPF prog-id=163 op=LOAD Oct 31 01:18:57.371000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb1d6ceb0 a2=94 a3=54428f items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.371000 audit: BPF prog-id=163 op=UNLOAD Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.371000 audit: BPF prog-id=164 op=LOAD Oct 31 01:18:57.371000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb1d6cee0 a2=94 a3=2 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.371000 audit: BPF prog-id=164 op=UNLOAD Oct 31 01:18:57.372622 env[1202]: time="2025-10-31T01:18:57.372572046Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.480119 kernel: kauditd_printk_skb: 328 callbacks suppressed Oct 31 01:18:57.480220 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.490013 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.490045 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:18:57.490087 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.491370 kernel: audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:18:57.491440 kernel: audit: backlog limit exceeded Oct 31 01:18:57.496341 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.496375 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.496391 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.496428 kernel: audit: type=1400 audit(1761873537.470:1135): avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.470000 audit: BPF prog-id=165 op=LOAD Oct 31 01:18:57.470000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb1d6cda0 a2=94 a3=1 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.470000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.479000 audit: BPF prog-id=165 op=UNLOAD Oct 31 01:18:57.479000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.479000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb1d6ce70 a2=50 a3=7fffb1d6cf50 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.479000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6cdb0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb1d6cde0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb1d6ccf0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6ce00 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6cde0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6cdd0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6ce00 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb1d6cde0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb1d6ce00 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb1d6cdd0 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb1d6ce40 a2=28 a3=0 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb1d6cbf0 a2=50 a3=1 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.487000 audit: BPF prog-id=166 op=LOAD Oct 31 01:18:57.487000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb1d6cbf0 a2=94 a3=5 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.520000 audit: BPF prog-id=166 op=UNLOAD Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb1d6cca0 a2=50 a3=1 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb1d6cdc0 a2=4 a3=38 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { confidentiality } for pid=4032 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.520000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb1d6ce10 a2=94 a3=6 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { confidentiality } for pid=4032 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.520000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb1d6c5c0 a2=94 a3=88 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { perfmon } for pid=4032 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { bpf } for pid=4032 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.520000 audit[4032]: AVC avc: denied { confidentiality } for pid=4032 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.520000 audit[4032]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb1d6c5c0 a2=94 a3=88 items=0 ppid=4014 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit: BPF prog-id=167 op=LOAD Oct 31 01:18:57.526000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc391c49e0 a2=98 a3=1999999999999999 items=0 ppid=4014 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.526000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:18:57.526000 audit: BPF prog-id=167 op=UNLOAD Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.526000 audit: BPF prog-id=168 op=LOAD Oct 31 01:18:57.526000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc391c48c0 a2=94 a3=ffff items=0 ppid=4014 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.526000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:18:57.527000 audit: BPF prog-id=168 op=UNLOAD Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { perfmon } for pid=4035 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit[4035]: AVC avc: denied { bpf } for pid=4035 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.527000 audit: BPF prog-id=169 op=LOAD Oct 31 01:18:57.527000 audit[4035]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc391c4900 a2=94 a3=7ffc391c4ae0 items=0 ppid=4014 pid=4035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.527000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:18:57.527000 audit: BPF prog-id=169 op=UNLOAD Oct 31 01:18:57.538868 env[1202]: time="2025-10-31T01:18:57.538832023Z" level=info msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" Oct 31 01:18:57.539538 env[1202]: time="2025-10-31T01:18:57.539514966Z" level=info msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" Oct 31 01:18:57.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.142:22-10.0.0.1:60866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:57.543562 systemd[1]: Started sshd@9-10.0.0.142:22-10.0.0.1:60866.service. Oct 31 01:18:57.578902 systemd-networkd[1029]: vxlan.calico: Link UP Oct 31 01:18:57.578909 systemd-networkd[1029]: vxlan.calico: Gained carrier Oct 31 01:18:57.579000 audit[4064]: USER_ACCT pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.580684 sshd[4064]: Accepted publickey for core from 10.0.0.1 port 60866 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:57.581000 audit[4064]: CRED_ACQ pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.581000 audit[4064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2898b90 a2=3 a3=0 items=0 ppid=1 pid=4064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:57.582144 sshd[4064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:57.587607 systemd[1]: Started session-10.scope. Oct 31 01:18:57.589158 systemd-logind[1193]: New session 10 of user core. Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit: BPF prog-id=170 op=LOAD Oct 31 01:18:57.599000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd190ede60 a2=98 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.599000 audit: BPF prog-id=170 op=UNLOAD Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit: BPF prog-id=171 op=LOAD Oct 31 01:18:57.599000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd190edc70 a2=94 a3=54428f items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.599000 audit: BPF prog-id=171 op=UNLOAD Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.599000 audit: BPF prog-id=172 op=LOAD Oct 31 01:18:57.599000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd190edca0 a2=94 a3=2 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit: BPF prog-id=172 op=UNLOAD Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edb70 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd190edba0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd190edab0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edbc0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edba0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edb90 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edbc0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd190edba0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd190edbc0 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd190edb90 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd190edc00 a2=28 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit: BPF prog-id=173 op=LOAD Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd190eda70 a2=94 a3=0 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.600000 audit: BPF prog-id=173 op=UNLOAD Oct 31 01:18:57.600000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.600000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd190eda60 a2=50 a3=2800 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.603000 audit[4064]: USER_START pid=4064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd190eda60 a2=50 a3=2800 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.604000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit: BPF prog-id=174 op=LOAD Oct 31 01:18:57.604000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd190ed280 a2=94 a3=2 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.604000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.604000 audit: BPF prog-id=174 op=UNLOAD Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.604000 audit: BPF prog-id=175 op=LOAD Oct 31 01:18:57.604000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd190ed380 a2=94 a3=30 items=0 ppid=4014 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.604000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:18:57.604000 audit[4104]: CRED_ACQ pid=4104 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit: BPF prog-id=176 op=LOAD Oct 31 01:18:57.608000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcee730aa0 a2=98 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.608000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.608000 audit: BPF prog-id=176 op=UNLOAD Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit: BPF prog-id=177 op=LOAD Oct 31 01:18:57.608000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcee730890 a2=94 a3=54428f items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.608000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.608000 audit: BPF prog-id=177 op=UNLOAD Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.608000 audit: BPF prog-id=178 op=LOAD Oct 31 01:18:57.608000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcee7308c0 a2=94 a3=2 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.608000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.608000 audit: BPF prog-id=178 op=UNLOAD Oct 31 01:18:57.631908 env[1202]: time="2025-10-31T01:18:57.631839205Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:18:57.632119 kubelet[1938]: E1031 01:18:57.632071 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:18:57.632175 kubelet[1938]: E1031 01:18:57.632121 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:18:57.632276 kubelet[1938]: E1031 01:18:57.632232 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:57.634167 env[1202]: time="2025-10-31T01:18:57.634132576Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:18:57.652705 kubelet[1938]: E1031 01:18:57.652650 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:57.653392 kubelet[1938]: E1031 01:18:57.653311 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:18:57.653392 kubelet[1938]: E1031 01:18:57.653363 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.714000 audit: BPF prog-id=179 op=LOAD Oct 31 01:18:57.714000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcee730780 a2=94 a3=1 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.714000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.715000 audit: BPF prog-id=179 op=UNLOAD Oct 31 01:18:57.715000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.715000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcee730850 a2=50 a3=7ffcee730930 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.715000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.723000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.723000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee730790 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.723000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.724000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.724000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcee7307c0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.724000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.724000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcee7306d0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.724000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.724000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee7307e0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.724000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.724000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee7307c0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.725000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.725000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee7307b0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.725000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.725000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.725000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee7307e0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.725000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.725000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.725000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcee7307c0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.725000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.725000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.725000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcee7307e0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.725000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.726000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.726000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcee7307b0 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.726000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.726000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.726000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcee730820 a2=28 a3=0 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.726000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.726000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.726000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcee7305d0 a2=50 a3=1 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.726000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.727000 audit: BPF prog-id=180 op=LOAD Oct 31 01:18:57.727000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcee7305d0 a2=94 a3=5 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.727000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.728000 audit: BPF prog-id=180 op=UNLOAD Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcee730680 a2=50 a3=1 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcee7307a0 a2=4 a3=38 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.728000 audit[4108]: AVC avc: denied { confidentiality } for pid=4108 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.728000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcee7307f0 a2=94 a3=6 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.729000 audit[4108]: AVC avc: denied { confidentiality } for pid=4108 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.729000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcee72ffa0 a2=94 a3=88 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.729000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.730000 audit[4108]: AVC avc: denied { confidentiality } for pid=4108 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:18:57.730000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcee72ffa0 a2=94 a3=88 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.732000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.732000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcee7319d0 a2=10 a3=208 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.732000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.732000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcee731870 a2=10 a3=3 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.732000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.732000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcee731810 a2=10 a3=3 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.733000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.733000 audit[4108]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcee731810 a2=10 a3=7 items=0 ppid=4014 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.733000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:18:57.739000 audit: BPF prog-id=175 op=UNLOAD Oct 31 01:18:57.749492 systemd-networkd[1029]: cali924bb654f63: Gained IPv6LL Oct 31 01:18:57.788000 audit[4148]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:57.788000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffe63e2b80 a2=0 a3=7fffe63e2b6c items=0 ppid=4014 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:57.789000 audit[4153]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:57.789000 audit[4153]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff695ae4d0 a2=0 a3=7fff695ae4bc items=0 ppid=4014 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.789000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:57.793000 audit[4149]: NETFILTER_CFG table=raw:109 family=2 entries=21 op=nft_register_chain pid=4149 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:57.793000 audit[4149]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd27223eb0 a2=0 a3=7ffd27223e9c items=0 ppid=4014 pid=4149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:57.799000 audit[4152]: NETFILTER_CFG table=filter:110 family=2 entries=228 op=nft_register_chain pid=4152 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:57.799000 audit[4152]: SYSCALL arch=c000003e syscall=46 success=yes exit=134056 a0=3 a1=7ffc6eddefe0 a2=0 a3=7ffc6eddefcc items=0 ppid=4014 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.799000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:57.876809 systemd-networkd[1029]: cali63bb5990cca: Gained IPv6LL Oct 31 01:18:57.877977 systemd-networkd[1029]: calicc792e46cf4: Gained IPv6LL Oct 31 01:18:57.882673 sshd[4064]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:57.883000 audit[4064]: USER_END pid=4064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.883000 audit[4064]: CRED_DISP pid=4064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:57.885432 systemd-logind[1193]: Session 10 logged out. Waiting for processes to exit. Oct 31 01:18:57.885752 systemd[1]: sshd@9-10.0.0.142:22-10.0.0.1:60866.service: Deactivated successfully. Oct 31 01:18:57.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.142:22-10.0.0.1:60866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:57.886449 systemd[1]: session-10.scope: Deactivated successfully. Oct 31 01:18:57.887693 systemd-logind[1193]: Removed session 10. Oct 31 01:18:57.899000 audit[4174]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.899000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffdb4a9f00 a2=0 a3=7fffdb4a9eec items=0 ppid=2045 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.903000 audit[4174]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.903000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffdb4a9f00 a2=0 a3=0 items=0 ppid=2045 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.890 [INFO][4080] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.890 [INFO][4080] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" iface="eth0" netns="/var/run/netns/cni-cbe1bec4-9818-fb50-8c51-6c6adf6184e5" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.890 [INFO][4080] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" iface="eth0" netns="/var/run/netns/cni-cbe1bec4-9818-fb50-8c51-6c6adf6184e5" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.892 [INFO][4080] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" iface="eth0" netns="/var/run/netns/cni-cbe1bec4-9818-fb50-8c51-6c6adf6184e5" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.892 [INFO][4080] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.892 [INFO][4080] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.923 [INFO][4163] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.923 [INFO][4163] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.923 [INFO][4163] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.930 [WARNING][4163] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.930 [INFO][4163] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.931 [INFO][4163] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:57.934439 env[1202]: 2025-10-31 01:18:57.933 [INFO][4080] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:18:57.935054 env[1202]: time="2025-10-31T01:18:57.935018006Z" level=info msg="TearDown network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" successfully" Oct 31 01:18:57.935132 env[1202]: time="2025-10-31T01:18:57.935110980Z" level=info msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" returns successfully" Oct 31 01:18:57.935791 kubelet[1938]: E1031 01:18:57.935429 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:57.937254 systemd[1]: run-netns-cni\x2dcbe1bec4\x2d9818\x2dfb50\x2d8c51\x2d6c6adf6184e5.mount: Deactivated successfully. Oct 31 01:18:57.938334 env[1202]: time="2025-10-31T01:18:57.938297499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jhtwg,Uid:c563bd83-bb8b-4ae5-aacd-c471087df722,Namespace:kube-system,Attempt:1,}" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" iface="eth0" netns="/var/run/netns/cni-5547a1db-34ff-e58f-fd11-0c1c068442b5" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" iface="eth0" netns="/var/run/netns/cni-5547a1db-34ff-e58f-fd11-0c1c068442b5" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" iface="eth0" netns="/var/run/netns/cni-5547a1db-34ff-e58f-fd11-0c1c068442b5" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.893 [INFO][4071] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.924 [INFO][4166] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.924 [INFO][4166] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.931 [INFO][4166] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.936 [WARNING][4166] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.936 [INFO][4166] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.938 [INFO][4166] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:57.942441 env[1202]: 2025-10-31 01:18:57.940 [INFO][4071] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:18:57.942870 env[1202]: time="2025-10-31T01:18:57.942576932Z" level=info msg="TearDown network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" successfully" Oct 31 01:18:57.942870 env[1202]: time="2025-10-31T01:18:57.942608541Z" level=info msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" returns successfully" Oct 31 01:18:57.942917 kubelet[1938]: E1031 01:18:57.942804 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:57.943102 env[1202]: time="2025-10-31T01:18:57.943078034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wb5j,Uid:988ebf4f-1524-4f14-a6eb-f0cb2327f4d3,Namespace:kube-system,Attempt:1,}" Oct 31 01:18:57.944592 systemd[1]: run-netns-cni\x2d5547a1db\x2d34ff\x2de58f\x2dfd11\x2d0c1c068442b5.mount: Deactivated successfully. Oct 31 01:18:58.063246 systemd-networkd[1029]: calib92e20dbb4f: Link UP Oct 31 01:18:58.066134 systemd-networkd[1029]: calib92e20dbb4f: Gained carrier Oct 31 01:18:58.066449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib92e20dbb4f: link becomes ready Oct 31 01:18:58.261601 env[1202]: time="2025-10-31T01:18:58.261541002Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:57.983 [INFO][4183] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0 coredns-668d6bf9bc- kube-system c563bd83-bb8b-4ae5-aacd-c471087df722 1050 0 2025-10-31 01:18:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-jhtwg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib92e20dbb4f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:57.983 [INFO][4183] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.027 [INFO][4215] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" HandleID="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.027 [INFO][4215] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" HandleID="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033a680), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-jhtwg", "timestamp":"2025-10-31 01:18:58.027144616 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.027 [INFO][4215] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.027 [INFO][4215] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.027 [INFO][4215] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.033 [INFO][4215] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.037 [INFO][4215] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.041 [INFO][4215] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.042 [INFO][4215] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.044 [INFO][4215] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.044 [INFO][4215] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.045 [INFO][4215] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32 Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.049 [INFO][4215] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.054 [INFO][4215] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.054 [INFO][4215] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" host="localhost" Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.054 [INFO][4215] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:58.338836 env[1202]: 2025-10-31 01:18:58.054 [INFO][4215] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" HandleID="k8s-pod-network.edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.060 [INFO][4183] cni-plugin/k8s.go 418: Populated endpoint ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c563bd83-bb8b-4ae5-aacd-c471087df722", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-jhtwg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib92e20dbb4f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.060 [INFO][4183] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.061 [INFO][4183] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib92e20dbb4f ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.066 [INFO][4183] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.067 [INFO][4183] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c563bd83-bb8b-4ae5-aacd-c471087df722", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32", Pod:"coredns-668d6bf9bc-jhtwg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib92e20dbb4f", MAC:"06:7d:04:c4:1b:42", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:58.339516 env[1202]: 2025-10-31 01:18:58.337 [INFO][4183] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32" Namespace="kube-system" Pod="coredns-668d6bf9bc-jhtwg" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:18:58.341763 env[1202]: time="2025-10-31T01:18:58.341704435Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:18:58.342473 kubelet[1938]: E1031 01:18:58.342402 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:18:58.342550 kubelet[1938]: E1031 01:18:58.342485 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:18:58.342620 kubelet[1938]: E1031 01:18:58.342579 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:18:58.343920 kubelet[1938]: E1031 01:18:58.343872 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:58.354700 env[1202]: time="2025-10-31T01:18:58.354622150Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:58.354790 env[1202]: time="2025-10-31T01:18:58.354712409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:58.354790 env[1202]: time="2025-10-31T01:18:58.354735653Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:58.355397 env[1202]: time="2025-10-31T01:18:58.355336443Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32 pid=4265 runtime=io.containerd.runc.v2 Oct 31 01:18:58.376222 systemd[1]: Started cri-containerd-edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32.scope. Oct 31 01:18:58.378636 systemd[1]: run-containerd-runc-k8s.io-edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32-runc.QJe15e.mount: Deactivated successfully. Oct 31 01:18:58.386328 systemd-networkd[1029]: cali6c04e8a1995: Link UP Oct 31 01:18:58.391971 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6c04e8a1995: link becomes ready Oct 31 01:18:58.391591 systemd-networkd[1029]: cali6c04e8a1995: Gained carrier Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.393000 audit: BPF prog-id=181 op=LOAD Oct 31 01:18:58.394000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.394000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663237643666393962363338366534343236373261386435663431 Oct 31 01:18:58.394000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.394000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663237643666393962363338366534343236373261386435663431 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:57.994 [INFO][4195] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0 coredns-668d6bf9bc- kube-system 988ebf4f-1524-4f14-a6eb-f0cb2327f4d3 1054 0 2025-10-31 01:18:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-6wb5j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6c04e8a1995 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:57.995 [INFO][4195] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.029 [INFO][4213] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" HandleID="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.029 [INFO][4213] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" HandleID="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001354e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-6wb5j", "timestamp":"2025-10-31 01:18:58.029735615 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.030 [INFO][4213] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.054 [INFO][4213] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.055 [INFO][4213] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.336 [INFO][4213] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.349 [INFO][4213] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.353 [INFO][4213] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.355 [INFO][4213] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.365 [INFO][4213] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.365 [INFO][4213] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.366 [INFO][4213] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.370 [INFO][4213] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.382 [INFO][4213] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.382 [INFO][4213] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" host="localhost" Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.382 [INFO][4213] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:58.398035 env[1202]: 2025-10-31 01:18:58.382 [INFO][4213] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" HandleID="k8s-pod-network.608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.384 [INFO][4195] cni-plugin/k8s.go 418: Populated endpoint ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-6wb5j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6c04e8a1995", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.384 [INFO][4195] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.384 [INFO][4195] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6c04e8a1995 ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.386 [INFO][4195] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.387 [INFO][4195] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a", Pod:"coredns-668d6bf9bc-6wb5j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6c04e8a1995", MAC:"b2:b8:80:c8:c8:d2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:58.398729 env[1202]: 2025-10-31 01:18:58.395 [INFO][4195] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a" Namespace="kube-system" Pod="coredns-668d6bf9bc-6wb5j" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:18:58.396000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.396000 audit: BPF prog-id=182 op=LOAD Oct 31 01:18:58.396000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f2030 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663237643666393962363338366534343236373261386435663431 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.399000 audit: BPF prog-id=183 op=LOAD Oct 31 01:18:58.399000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f2078 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663237643666393962363338366534343236373261386435663431 Oct 31 01:18:58.399000 audit: BPF prog-id=183 op=UNLOAD Oct 31 01:18:58.399000 audit: BPF prog-id=182 op=UNLOAD Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.400000 audit: BPF prog-id=184 op=LOAD Oct 31 01:18:58.400000 audit[4316]: NETFILTER_CFG table=filter:113 family=2 entries=58 op=nft_register_chain pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:58.400000 audit[4316]: SYSCALL arch=c000003e syscall=46 success=yes exit=27304 a0=3 a1=7ffc218f5eb0 a2=0 a3=7ffc218f5e9c items=0 ppid=4014 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:58.400000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f2488 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663237643666393962363338366534343236373261386435663431 Oct 31 01:18:58.401929 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:58.407260 env[1202]: time="2025-10-31T01:18:58.407194464Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:58.407260 env[1202]: time="2025-10-31T01:18:58.407235651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:58.407405 env[1202]: time="2025-10-31T01:18:58.407245980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:58.407536 env[1202]: time="2025-10-31T01:18:58.407395672Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a pid=4329 runtime=io.containerd.runc.v2 Oct 31 01:18:58.419293 systemd[1]: Started cri-containerd-608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a.scope. Oct 31 01:18:58.423842 env[1202]: time="2025-10-31T01:18:58.423786033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jhtwg,Uid:c563bd83-bb8b-4ae5-aacd-c471087df722,Namespace:kube-system,Attempt:1,} returns sandbox id \"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32\"" Oct 31 01:18:58.424871 kubelet[1938]: E1031 01:18:58.424844 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:58.428540 env[1202]: time="2025-10-31T01:18:58.428508707Z" level=info msg="CreateContainer within sandbox \"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit: BPF prog-id=185 op=LOAD Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4329 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630386530663662303939653866306665363539356663336663313832 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4329 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630386530663662303939653866306665363539356663336663313832 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.433000 audit: BPF prog-id=186 op=LOAD Oct 31 01:18:58.433000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221040 items=0 ppid=4329 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630386530663662303939653866306665363539356663336663313832 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit: BPF prog-id=187 op=LOAD Oct 31 01:18:58.434000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221088 items=0 ppid=4329 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630386530663662303939653866306665363539356663336663313832 Oct 31 01:18:58.434000 audit: BPF prog-id=187 op=UNLOAD Oct 31 01:18:58.434000 audit: BPF prog-id=186 op=UNLOAD Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.434000 audit: BPF prog-id=188 op=LOAD Oct 31 01:18:58.434000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221498 items=0 ppid=4329 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630386530663662303939653866306665363539356663336663313832 Oct 31 01:18:58.435244 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:58.446182 env[1202]: time="2025-10-31T01:18:58.446156331Z" level=info msg="CreateContainer within sandbox \"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"455a4f2376702c57899b432285016711c3d57ca7e10b1a0007dc58c6a0d16a1d\"" Oct 31 01:18:58.446772 env[1202]: time="2025-10-31T01:18:58.446734717Z" level=info msg="StartContainer for \"455a4f2376702c57899b432285016711c3d57ca7e10b1a0007dc58c6a0d16a1d\"" Oct 31 01:18:58.458793 env[1202]: time="2025-10-31T01:18:58.458762319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6wb5j,Uid:988ebf4f-1524-4f14-a6eb-f0cb2327f4d3,Namespace:kube-system,Attempt:1,} returns sandbox id \"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a\"" Oct 31 01:18:58.459653 kubelet[1938]: E1031 01:18:58.459616 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:58.461446 env[1202]: time="2025-10-31T01:18:58.461388495Z" level=info msg="CreateContainer within sandbox \"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 01:18:58.465116 systemd[1]: Started cri-containerd-455a4f2376702c57899b432285016711c3d57ca7e10b1a0007dc58c6a0d16a1d.scope. Oct 31 01:18:58.497000 audit[4402]: NETFILTER_CFG table=filter:114 family=2 entries=58 op=nft_register_chain pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:58.497000 audit[4402]: SYSCALL arch=c000003e syscall=46 success=yes exit=26760 a0=3 a1=7ffc8c27a460 a2=0 a3=7ffc8c27a44c items=0 ppid=4014 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.597000 audit: BPF prog-id=189 op=LOAD Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4265 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435356134663233373637303263353738393962343332323835303136 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4265 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435356134663233373637303263353738393962343332323835303136 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit: BPF prog-id=190 op=LOAD Oct 31 01:18:58.598000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030e7c0 items=0 ppid=4265 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435356134663233373637303263353738393962343332323835303136 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit: BPF prog-id=191 op=LOAD Oct 31 01:18:58.598000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030e808 items=0 ppid=4265 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435356134663233373637303263353738393962343332323835303136 Oct 31 01:18:58.598000 audit: BPF prog-id=191 op=UNLOAD Oct 31 01:18:58.598000 audit: BPF prog-id=190 op=UNLOAD Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.598000 audit: BPF prog-id=192 op=LOAD Oct 31 01:18:58.598000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030ec18 items=0 ppid=4265 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435356134663233373637303263353738393962343332323835303136 Oct 31 01:18:58.640000 audit[4392]: AVC avc: denied { getattr } for pid=4392 comm="coredns" path="cgroup:[4026532638]" dev="nsfs" ino=4026532638 scontext=system_u:system_r:svirt_lxc_net_t:s0:c528,c838 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 01:18:58.640000 audit[4392]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0005de7f8 a2=c0005e2d38 a3=0 items=0 ppid=4265 pid=4392 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c528,c838 key=(null) Oct 31 01:18:58.640000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 01:18:58.696667 env[1202]: time="2025-10-31T01:18:58.696570778Z" level=info msg="CreateContainer within sandbox \"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e5d29138efd22a12fc00356991c6dc8355d20e6c4631bf9bfebc4f318d29a2b8\"" Oct 31 01:18:58.697136 env[1202]: time="2025-10-31T01:18:58.697108819Z" level=info msg="StartContainer for \"e5d29138efd22a12fc00356991c6dc8355d20e6c4631bf9bfebc4f318d29a2b8\"" Oct 31 01:18:58.709667 systemd[1]: Started cri-containerd-e5d29138efd22a12fc00356991c6dc8355d20e6c4631bf9bfebc4f318d29a2b8.scope. Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.719000 audit: BPF prog-id=193 op=LOAD Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4329 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643239313338656664323261313266633030333536393931633664 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4329 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643239313338656664323261313266633030333536393931633664 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit: BPF prog-id=194 op=LOAD Oct 31 01:18:58.720000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b4e60 items=0 ppid=4329 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643239313338656664323261313266633030333536393931633664 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit: BPF prog-id=195 op=LOAD Oct 31 01:18:58.720000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b4ea8 items=0 ppid=4329 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643239313338656664323261313266633030333536393931633664 Oct 31 01:18:58.720000 audit: BPF prog-id=195 op=UNLOAD Oct 31 01:18:58.720000 audit: BPF prog-id=194 op=UNLOAD Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:58.720000 audit: BPF prog-id=196 op=LOAD Oct 31 01:18:58.720000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b52b8 items=0 ppid=4329 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535643239313338656664323261313266633030333536393931633664 Oct 31 01:18:58.746948 env[1202]: time="2025-10-31T01:18:58.746910296Z" level=info msg="StartContainer for \"455a4f2376702c57899b432285016711c3d57ca7e10b1a0007dc58c6a0d16a1d\" returns successfully" Oct 31 01:18:58.748270 env[1202]: time="2025-10-31T01:18:58.748229655Z" level=info msg="StartContainer for \"e5d29138efd22a12fc00356991c6dc8355d20e6c4631bf9bfebc4f318d29a2b8\" returns successfully" Oct 31 01:18:58.751708 kubelet[1938]: E1031 01:18:58.751640 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:58.753043 kubelet[1938]: E1031 01:18:58.752976 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:18:58.760000 audit[4437]: AVC avc: denied { getattr } for pid=4437 comm="coredns" path="cgroup:[4026532641]" dev="nsfs" ino=4026532641 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c134 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 01:18:58.760000 audit[4437]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c900 a2=c000499628 a3=0 items=0 ppid=4329 pid=4437 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c134 key=(null) Oct 31 01:18:58.760000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 01:18:58.791979 kubelet[1938]: I1031 01:18:58.791318 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-jhtwg" podStartSLOduration=38.79129857 podStartE2EDuration="38.79129857s" podCreationTimestamp="2025-10-31 01:18:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:58.78046989 +0000 UTC m=+45.311909425" watchObservedRunningTime="2025-10-31 01:18:58.79129857 +0000 UTC m=+45.322738094" Oct 31 01:18:58.801000 audit[4459]: NETFILTER_CFG table=filter:115 family=2 entries=20 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:58.801000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe97dd1c30 a2=0 a3=7ffe97dd1c1c items=0 ppid=2045 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:58.805000 audit[4459]: NETFILTER_CFG table=nat:116 family=2 entries=14 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:58.805000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe97dd1c30 a2=0 a3=0 items=0 ppid=2045 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:58.837520 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Oct 31 01:18:59.537692 env[1202]: time="2025-10-31T01:18:59.537646965Z" level=info msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" iface="eth0" netns="/var/run/netns/cni-29b0a609-b6f6-d988-127e-adc15892ea5d" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" iface="eth0" netns="/var/run/netns/cni-29b0a609-b6f6-d988-127e-adc15892ea5d" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" iface="eth0" netns="/var/run/netns/cni-29b0a609-b6f6-d988-127e-adc15892ea5d" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.599 [INFO][4471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.618 [INFO][4482] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.618 [INFO][4482] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.618 [INFO][4482] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.623 [WARNING][4482] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.623 [INFO][4482] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.624 [INFO][4482] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:59.629981 env[1202]: 2025-10-31 01:18:59.628 [INFO][4471] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:18:59.632443 systemd[1]: run-netns-cni\x2d29b0a609\x2db6f6\x2dd988\x2d127e\x2dadc15892ea5d.mount: Deactivated successfully. Oct 31 01:18:59.633272 env[1202]: time="2025-10-31T01:18:59.633229631Z" level=info msg="TearDown network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" successfully" Oct 31 01:18:59.633272 env[1202]: time="2025-10-31T01:18:59.633267642Z" level=info msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" returns successfully" Oct 31 01:18:59.634046 env[1202]: time="2025-10-31T01:18:59.634012993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-q5nq9,Uid:a85f13d0-1c09-4bed-b439-c5aa71c1b595,Namespace:calico-apiserver,Attempt:1,}" Oct 31 01:18:59.759462 kubelet[1938]: E1031 01:18:59.755363 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:59.759462 kubelet[1938]: E1031 01:18:59.756558 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:59.771843 systemd-networkd[1029]: cali60b42a61415: Link UP Oct 31 01:18:59.776677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:18:59.776728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60b42a61415: link becomes ready Oct 31 01:18:59.776081 systemd-networkd[1029]: cali60b42a61415: Gained carrier Oct 31 01:18:59.787000 audit[4515]: NETFILTER_CFG table=filter:117 family=2 entries=17 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:59.787000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd717f6d90 a2=0 a3=7ffd717f6d7c items=0 ppid=2045 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:59.791343 kubelet[1938]: I1031 01:18:59.791272 1938 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6wb5j" podStartSLOduration=39.791257879 podStartE2EDuration="39.791257879s" podCreationTimestamp="2025-10-31 01:18:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:18:59.778624892 +0000 UTC m=+46.310064436" watchObservedRunningTime="2025-10-31 01:18:59.791257879 +0000 UTC m=+46.322697413" Oct 31 01:18:59.793000 audit[4515]: NETFILTER_CFG table=nat:118 family=2 entries=35 op=nft_register_chain pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:59.793000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd717f6d90 a2=0 a3=7ffd717f6d7c items=0 ppid=2045 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.693 [INFO][4490] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0 calico-apiserver-f875b9d54- calico-apiserver a85f13d0-1c09-4bed-b439-c5aa71c1b595 1109 0 2025-10-31 01:18:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f875b9d54 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-f875b9d54-q5nq9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali60b42a61415 [] [] }} ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.694 [INFO][4490] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.737 [INFO][4505] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" HandleID="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.737 [INFO][4505] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" HandleID="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df590), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-f875b9d54-q5nq9", "timestamp":"2025-10-31 01:18:59.737714764 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.737 [INFO][4505] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.738 [INFO][4505] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.738 [INFO][4505] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.745 [INFO][4505] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.749 [INFO][4505] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.752 [INFO][4505] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.753 [INFO][4505] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.755 [INFO][4505] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.755 [INFO][4505] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.757 [INFO][4505] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571 Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.760 [INFO][4505] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.767 [INFO][4505] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.767 [INFO][4505] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" host="localhost" Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.767 [INFO][4505] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:18:59.797320 env[1202]: 2025-10-31 01:18:59.767 [INFO][4505] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" HandleID="k8s-pod-network.1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.769 [INFO][4490] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"a85f13d0-1c09-4bed-b439-c5aa71c1b595", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-f875b9d54-q5nq9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60b42a61415", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.769 [INFO][4490] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.769 [INFO][4490] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60b42a61415 ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.779 [INFO][4490] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.779 [INFO][4490] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"a85f13d0-1c09-4bed-b439-c5aa71c1b595", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571", Pod:"calico-apiserver-f875b9d54-q5nq9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60b42a61415", MAC:"7a:66:f4:44:f1:48", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:18:59.797907 env[1202]: 2025-10-31 01:18:59.795 [INFO][4490] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571" Namespace="calico-apiserver" Pod="calico-apiserver-f875b9d54-q5nq9" WorkloadEndpoint="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:18:59.807000 audit[4524]: NETFILTER_CFG table=filter:119 family=2 entries=41 op=nft_register_chain pid=4524 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:18:59.807000 audit[4524]: SYSCALL arch=c000003e syscall=46 success=yes exit=23096 a0=3 a1=7ffdd4a3d790 a2=0 a3=7ffdd4a3d77c items=0 ppid=4014 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.807000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:18:59.810395 env[1202]: time="2025-10-31T01:18:59.810335103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:59.810573 env[1202]: time="2025-10-31T01:18:59.810369247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:59.810573 env[1202]: time="2025-10-31T01:18:59.810379097Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:59.810573 env[1202]: time="2025-10-31T01:18:59.810532965Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571 pid=4532 runtime=io.containerd.runc.v2 Oct 31 01:18:59.823040 systemd[1]: Started cri-containerd-1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571.scope. Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.833000 audit: BPF prog-id=197 op=LOAD Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4532 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303061633137643930346361613732643531623533303261303363 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4532 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303061633137643930346361613732643531623533303261303363 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit: BPF prog-id=198 op=LOAD Oct 31 01:18:59.834000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a4ac0 items=0 ppid=4532 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303061633137643930346361613732643531623533303261303363 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit: BPF prog-id=199 op=LOAD Oct 31 01:18:59.834000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a4b08 items=0 ppid=4532 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303061633137643930346361613732643531623533303261303363 Oct 31 01:18:59.834000 audit: BPF prog-id=199 op=UNLOAD Oct 31 01:18:59.834000 audit: BPF prog-id=198 op=UNLOAD Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:59.834000 audit: BPF prog-id=200 op=LOAD Oct 31 01:18:59.834000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4f18 items=0 ppid=4532 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303061633137643930346361613732643531623533303261303363 Oct 31 01:18:59.835680 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:18:59.857244 env[1202]: time="2025-10-31T01:18:59.857206002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f875b9d54-q5nq9,Uid:a85f13d0-1c09-4bed-b439-c5aa71c1b595,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571\"" Oct 31 01:18:59.858872 env[1202]: time="2025-10-31T01:18:59.858835393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:18:59.924570 systemd-networkd[1029]: cali6c04e8a1995: Gained IPv6LL Oct 31 01:19:00.052560 systemd-networkd[1029]: calib92e20dbb4f: Gained IPv6LL Oct 31 01:19:00.201717 env[1202]: time="2025-10-31T01:19:00.201557267Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:00.297289 env[1202]: time="2025-10-31T01:19:00.297214040Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:19:00.297495 kubelet[1938]: E1031 01:19:00.297442 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:00.297495 kubelet[1938]: E1031 01:19:00.297488 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:00.297658 kubelet[1938]: E1031 01:19:00.297603 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rd2vm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-f875b9d54-q5nq9_calico-apiserver(a85f13d0-1c09-4bed-b439-c5aa71c1b595): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:00.299455 kubelet[1938]: E1031 01:19:00.299402 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:19:00.758543 kubelet[1938]: E1031 01:19:00.758515 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:00.758792 kubelet[1938]: E1031 01:19:00.758650 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:00.759088 kubelet[1938]: E1031 01:19:00.759061 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:19:00.777000 audit[4568]: NETFILTER_CFG table=filter:120 family=2 entries=14 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:00.777000 audit[4568]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff6aa6f320 a2=0 a3=7fff6aa6f30c items=0 ppid=2045 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:00.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:00.787000 audit[4568]: NETFILTER_CFG table=nat:121 family=2 entries=56 op=nft_register_chain pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:00.787000 audit[4568]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff6aa6f320 a2=0 a3=7fff6aa6f30c items=0 ppid=2045 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:00.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:01.012611 systemd-networkd[1029]: cali60b42a61415: Gained IPv6LL Oct 31 01:19:01.760279 kubelet[1938]: E1031 01:19:01.760248 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:01.760994 kubelet[1938]: E1031 01:19:01.760942 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:19:02.885451 systemd[1]: Started sshd@10-10.0.0.142:22-10.0.0.1:50894.service. Oct 31 01:19:02.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.142:22-10.0.0.1:50894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:02.887297 kernel: kauditd_printk_skb: 768 callbacks suppressed Oct 31 01:19:02.887418 kernel: audit: type=1130 audit(1761873542.885:1336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.142:22-10.0.0.1:50894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:02.922000 audit[4578]: USER_ACCT pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.922861 sshd[4578]: Accepted publickey for core from 10.0.0.1 port 50894 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:02.924157 sshd[4578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:02.928719 systemd[1]: Started session-11.scope. Oct 31 01:19:02.929090 systemd-logind[1193]: New session 11 of user core. Oct 31 01:19:02.923000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.935833 kernel: audit: type=1101 audit(1761873542.922:1337): pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.935877 kernel: audit: type=1103 audit(1761873542.923:1338): pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.935893 kernel: audit: type=1006 audit(1761873542.923:1339): pid=4578 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 31 01:19:02.939767 kernel: audit: type=1300 audit(1761873542.923:1339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff541d03b0 a2=3 a3=0 items=0 ppid=1 pid=4578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:02.923000 audit[4578]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff541d03b0 a2=3 a3=0 items=0 ppid=1 pid=4578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:02.923000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:02.948972 kernel: audit: type=1327 audit(1761873542.923:1339): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:02.949007 kernel: audit: type=1105 audit(1761873542.932:1340): pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.932000 audit[4578]: USER_START pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.956690 kernel: audit: type=1103 audit(1761873542.933:1341): pid=4580 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:02.933000 audit[4580]: CRED_ACQ pid=4580 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.040675 sshd[4578]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:03.041000 audit[4578]: USER_END pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.043635 systemd[1]: sshd@10-10.0.0.142:22-10.0.0.1:50894.service: Deactivated successfully. Oct 31 01:19:03.044136 systemd[1]: session-11.scope: Deactivated successfully. Oct 31 01:19:03.046025 systemd[1]: Started sshd@11-10.0.0.142:22-10.0.0.1:50908.service. Oct 31 01:19:03.046363 systemd-logind[1193]: Session 11 logged out. Waiting for processes to exit. Oct 31 01:19:03.047481 systemd-logind[1193]: Removed session 11. Oct 31 01:19:03.041000 audit[4578]: CRED_DISP pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.056206 kernel: audit: type=1106 audit(1761873543.041:1342): pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.056324 kernel: audit: type=1104 audit(1761873543.041:1343): pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.142:22-10.0.0.1:50894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:03.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.142:22-10.0.0.1:50908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:03.082000 audit[4592]: USER_ACCT pid=4592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.082992 sshd[4592]: Accepted publickey for core from 10.0.0.1 port 50908 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:03.083000 audit[4592]: CRED_ACQ pid=4592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.083000 audit[4592]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd751fcb40 a2=3 a3=0 items=0 ppid=1 pid=4592 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:03.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:03.083749 sshd[4592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:03.086799 systemd-logind[1193]: New session 12 of user core. Oct 31 01:19:03.087580 systemd[1]: Started session-12.scope. Oct 31 01:19:03.090000 audit[4592]: USER_START pid=4592 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.091000 audit[4594]: CRED_ACQ pid=4594 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.221502 sshd[4592]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:03.224813 systemd[1]: Started sshd@12-10.0.0.142:22-10.0.0.1:50914.service. Oct 31 01:19:03.224000 audit[4592]: USER_END pid=4592 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.142:22-10.0.0.1:50914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:03.225000 audit[4592]: CRED_DISP pid=4592 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.228202 systemd-logind[1193]: Session 12 logged out. Waiting for processes to exit. Oct 31 01:19:03.228474 systemd[1]: sshd@11-10.0.0.142:22-10.0.0.1:50908.service: Deactivated successfully. Oct 31 01:19:03.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.142:22-10.0.0.1:50908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:03.229174 systemd[1]: session-12.scope: Deactivated successfully. Oct 31 01:19:03.229748 systemd-logind[1193]: Removed session 12. Oct 31 01:19:03.262000 audit[4603]: USER_ACCT pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.262855 sshd[4603]: Accepted publickey for core from 10.0.0.1 port 50914 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:03.263000 audit[4603]: CRED_ACQ pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.263000 audit[4603]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d7d88e0 a2=3 a3=0 items=0 ppid=1 pid=4603 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:03.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:03.264041 sshd[4603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:03.267932 systemd-logind[1193]: New session 13 of user core. Oct 31 01:19:03.268379 systemd[1]: Started session-13.scope. Oct 31 01:19:03.271000 audit[4603]: USER_START pid=4603 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.272000 audit[4606]: CRED_ACQ pid=4606 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.368057 sshd[4603]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:03.368000 audit[4603]: USER_END pid=4603 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.368000 audit[4603]: CRED_DISP pid=4603 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:03.370713 systemd[1]: sshd@12-10.0.0.142:22-10.0.0.1:50914.service: Deactivated successfully. Oct 31 01:19:03.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.142:22-10.0.0.1:50914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:03.371679 systemd[1]: session-13.scope: Deactivated successfully. Oct 31 01:19:03.372720 systemd-logind[1193]: Session 13 logged out. Waiting for processes to exit. Oct 31 01:19:03.373339 systemd-logind[1193]: Removed session 13. Oct 31 01:19:07.539291 env[1202]: time="2025-10-31T01:19:07.539249939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:19:07.875261 env[1202]: time="2025-10-31T01:19:07.875132339Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:07.876357 env[1202]: time="2025-10-31T01:19:07.876280474Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:19:07.876571 kubelet[1938]: E1031 01:19:07.876495 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:19:07.876808 kubelet[1938]: E1031 01:19:07.876588 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:19:07.876808 kubelet[1938]: E1031 01:19:07.876732 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:668b603cd51348619f3f634744be88b6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:07.878650 env[1202]: time="2025-10-31T01:19:07.878608435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:19:08.193968 env[1202]: time="2025-10-31T01:19:08.193916752Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:08.195130 env[1202]: time="2025-10-31T01:19:08.195086618Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:19:08.195344 kubelet[1938]: E1031 01:19:08.195300 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:19:08.195462 kubelet[1938]: E1031 01:19:08.195354 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:19:08.195532 kubelet[1938]: E1031 01:19:08.195482 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:08.196683 kubelet[1938]: E1031 01:19:08.196648 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:19:08.371758 systemd[1]: Started sshd@13-10.0.0.142:22-10.0.0.1:50930.service. Oct 31 01:19:08.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.142:22-10.0.0.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:08.373230 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 31 01:19:08.373279 kernel: audit: type=1130 audit(1761873548.371:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.142:22-10.0.0.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:08.408000 audit[4629]: USER_ACCT pid=4629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.409063 sshd[4629]: Accepted publickey for core from 10.0.0.1 port 50930 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:08.412093 sshd[4629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:08.411000 audit[4629]: CRED_ACQ pid=4629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.418667 systemd-logind[1193]: New session 14 of user core. Oct 31 01:19:08.419776 systemd[1]: Started session-14.scope. Oct 31 01:19:08.421988 kernel: audit: type=1101 audit(1761873548.408:1364): pid=4629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.422043 kernel: audit: type=1103 audit(1761873548.411:1365): pid=4629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.422070 kernel: audit: type=1006 audit(1761873548.411:1366): pid=4629 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 31 01:19:08.411000 audit[4629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3b3dbd90 a2=3 a3=0 items=0 ppid=1 pid=4629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.432937 kernel: audit: type=1300 audit(1761873548.411:1366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3b3dbd90 a2=3 a3=0 items=0 ppid=1 pid=4629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.432984 kernel: audit: type=1327 audit(1761873548.411:1366): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:08.411000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:08.435423 kernel: audit: type=1105 audit(1761873548.427:1367): pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.427000 audit[4629]: USER_START pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.429000 audit[4631]: CRED_ACQ pid=4631 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.450122 kernel: audit: type=1103 audit(1761873548.429:1368): pid=4631 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.531548 sshd[4629]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:08.531000 audit[4629]: USER_END pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.533663 systemd[1]: sshd@13-10.0.0.142:22-10.0.0.1:50930.service: Deactivated successfully. Oct 31 01:19:08.534323 systemd[1]: session-14.scope: Deactivated successfully. Oct 31 01:19:08.534825 systemd-logind[1193]: Session 14 logged out. Waiting for processes to exit. Oct 31 01:19:08.535469 systemd-logind[1193]: Removed session 14. Oct 31 01:19:08.532000 audit[4629]: CRED_DISP pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.545705 kernel: audit: type=1106 audit(1761873548.531:1369): pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.545760 kernel: audit: type=1104 audit(1761873548.532:1370): pid=4629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:08.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.142:22-10.0.0.1:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:10.538360 env[1202]: time="2025-10-31T01:19:10.538206764Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:19:11.080364 env[1202]: time="2025-10-31T01:19:11.080289643Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:11.081588 env[1202]: time="2025-10-31T01:19:11.081545240Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:19:11.081789 kubelet[1938]: E1031 01:19:11.081736 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:19:11.081789 kubelet[1938]: E1031 01:19:11.081782 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:19:11.082066 kubelet[1938]: E1031 01:19:11.082016 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5sppz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5d898459cb-gjxrm_calico-system(0849090e-7f9a-48ac-8218-b70639608778): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:11.082165 env[1202]: time="2025-10-31T01:19:11.082061188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:19:11.083509 kubelet[1938]: E1031 01:19:11.083398 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:19:11.161000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.161000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0078c5590 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.161000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.165000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.165000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c003f29300 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.165000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.165000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0078c55f0 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.168000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.168000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00653dd10 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.168000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.169000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.169000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c003f294c0 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.169000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.169000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.169000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0046899e0 a2=fc6 a3=0 items=0 ppid=1646 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c835 key=(null) Oct 31 01:19:11.169000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 31 01:19:11.223000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.223000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023e2320 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:11.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:11.223000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:11.223000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ff2fc0 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:11.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:11.423920 env[1202]: time="2025-10-31T01:19:11.423867454Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:11.425071 env[1202]: time="2025-10-31T01:19:11.425024405Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:19:11.425233 kubelet[1938]: E1031 01:19:11.425189 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:11.425292 kubelet[1938]: E1031 01:19:11.425235 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:11.425392 kubelet[1938]: E1031 01:19:11.425337 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:11.427199 env[1202]: time="2025-10-31T01:19:11.427162999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:19:11.790503 env[1202]: time="2025-10-31T01:19:11.790348785Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:11.791474 env[1202]: time="2025-10-31T01:19:11.791428301Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:19:11.791631 kubelet[1938]: E1031 01:19:11.791597 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:11.791704 kubelet[1938]: E1031 01:19:11.791637 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:11.791920 kubelet[1938]: E1031 01:19:11.791850 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:11.792146 env[1202]: time="2025-10-31T01:19:11.791923982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:19:11.793471 kubelet[1938]: E1031 01:19:11.793427 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:19:12.113854 env[1202]: time="2025-10-31T01:19:12.113729164Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:12.138499 env[1202]: time="2025-10-31T01:19:12.138428782Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:19:12.138653 kubelet[1938]: E1031 01:19:12.138613 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:12.138653 kubelet[1938]: E1031 01:19:12.138650 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:12.138919 kubelet[1938]: E1031 01:19:12.138754 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mqst5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-f875b9d54-r2d8s_calico-apiserver(69bb3f27-4922-4932-a7d6-aa046762d839): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:12.139970 kubelet[1938]: E1031 01:19:12.139928 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:19:13.528903 env[1202]: time="2025-10-31T01:19:13.528558633Z" level=info msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" Oct 31 01:19:13.535808 systemd[1]: Started sshd@14-10.0.0.142:22-10.0.0.1:55152.service. Oct 31 01:19:13.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.142:22-10.0.0.1:55152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:13.537431 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 31 01:19:13.537478 kernel: audit: type=1130 audit(1761873553.535:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.142:22-10.0.0.1:55152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:13.540574 env[1202]: time="2025-10-31T01:19:13.540512197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:19:13.576000 audit[4659]: USER_ACCT pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.585000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.586086 sshd[4659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:13.587433 sshd[4659]: Accepted publickey for core from 10.0.0.1 port 55152 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:13.592009 systemd[1]: Started session-15.scope. Oct 31 01:19:13.592888 kernel: audit: type=1101 audit(1761873553.576:1381): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.592948 kernel: audit: type=1103 audit(1761873553.585:1382): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.592482 systemd-logind[1193]: New session 15 of user core. Oct 31 01:19:13.596951 kernel: audit: type=1006 audit(1761873553.585:1383): pid=4659 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 31 01:19:13.585000 audit[4659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60c52010 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:13.604127 kernel: audit: type=1300 audit(1761873553.585:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60c52010 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:13.604219 kernel: audit: type=1327 audit(1761873553.585:1383): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:13.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:13.596000 audit[4659]: USER_START pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.572 [WARNING][4654] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" WorkloadEndpoint="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.572 [INFO][4654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.572 [INFO][4654] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" iface="eth0" netns="" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.572 [INFO][4654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.573 [INFO][4654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.601 [INFO][4666] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.601 [INFO][4666] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.601 [INFO][4666] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.607 [WARNING][4666] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.607 [INFO][4666] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.608 [INFO][4666] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.610906 env[1202]: 2025-10-31 01:19:13.609 [INFO][4654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.610906 env[1202]: time="2025-10-31T01:19:13.610865888Z" level=info msg="TearDown network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" successfully" Oct 31 01:19:13.611358 env[1202]: time="2025-10-31T01:19:13.610911243Z" level=info msg="StopPodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" returns successfully" Oct 31 01:19:13.614501 kernel: audit: type=1105 audit(1761873553.596:1384): pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.614587 kernel: audit: type=1103 audit(1761873553.596:1385): pid=4671 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.596000 audit[4671]: CRED_ACQ pid=4671 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.614984 env[1202]: time="2025-10-31T01:19:13.614958619Z" level=info msg="RemovePodSandbox for \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" Oct 31 01:19:13.615169 env[1202]: time="2025-10-31T01:19:13.614995689Z" level=info msg="Forcibly stopping sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\"" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.645 [WARNING][4684] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" WorkloadEndpoint="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.645 [INFO][4684] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.645 [INFO][4684] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" iface="eth0" netns="" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.645 [INFO][4684] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.645 [INFO][4684] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.672 [INFO][4696] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.672 [INFO][4696] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.672 [INFO][4696] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.678 [WARNING][4696] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.678 [INFO][4696] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" HandleID="k8s-pod-network.5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Workload="localhost-k8s-whisker--7f875f98bb--ls9l4-eth0" Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.680 [INFO][4696] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.683707 env[1202]: 2025-10-31 01:19:13.681 [INFO][4684] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d" Oct 31 01:19:13.684192 env[1202]: time="2025-10-31T01:19:13.684158004Z" level=info msg="TearDown network for sandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" successfully" Oct 31 01:19:13.694916 env[1202]: time="2025-10-31T01:19:13.694894735Z" level=info msg="RemovePodSandbox \"5e27a119856c1b165f3a784ff3d4887aecb58becc5724649365d3105ce58648d\" returns successfully" Oct 31 01:19:13.695470 env[1202]: time="2025-10-31T01:19:13.695440970Z" level=info msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" Oct 31 01:19:13.723321 sshd[4659]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:13.724000 audit[4659]: USER_END pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.726177 systemd-logind[1193]: Session 15 logged out. Waiting for processes to exit. Oct 31 01:19:13.727365 systemd[1]: sshd@14-10.0.0.142:22-10.0.0.1:55152.service: Deactivated successfully. Oct 31 01:19:13.727992 systemd[1]: session-15.scope: Deactivated successfully. Oct 31 01:19:13.729078 systemd-logind[1193]: Removed session 15. Oct 31 01:19:13.724000 audit[4659]: CRED_DISP pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.738662 kernel: audit: type=1106 audit(1761873553.724:1386): pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.738712 kernel: audit: type=1104 audit(1761873553.724:1387): pid=4659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:13.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.142:22-10.0.0.1:55152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.735 [WARNING][4719] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--p6cd4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c87c79af-530b-425e-a78b-abdafda90897", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb", Pod:"goldmane-666569f655-p6cd4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali924bb654f63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.735 [INFO][4719] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.735 [INFO][4719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" iface="eth0" netns="" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.735 [INFO][4719] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.735 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.752 [INFO][4730] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.752 [INFO][4730] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.752 [INFO][4730] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.758 [WARNING][4730] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.758 [INFO][4730] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.760 [INFO][4730] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.762962 env[1202]: 2025-10-31 01:19:13.761 [INFO][4719] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.763452 env[1202]: time="2025-10-31T01:19:13.762965080Z" level=info msg="TearDown network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" successfully" Oct 31 01:19:13.763452 env[1202]: time="2025-10-31T01:19:13.762992942Z" level=info msg="StopPodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" returns successfully" Oct 31 01:19:13.763505 env[1202]: time="2025-10-31T01:19:13.763438068Z" level=info msg="RemovePodSandbox for \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" Oct 31 01:19:13.763531 env[1202]: time="2025-10-31T01:19:13.763473244Z" level=info msg="Forcibly stopping sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\"" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.791 [WARNING][4748] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--p6cd4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"c87c79af-530b-425e-a78b-abdafda90897", ResourceVersion:"1232", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"92445d3144a56461c9af3621e608e3f59e1755f750d5ddc8fe28658334fd2adb", Pod:"goldmane-666569f655-p6cd4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali924bb654f63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.792 [INFO][4748] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.792 [INFO][4748] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" iface="eth0" netns="" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.792 [INFO][4748] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.792 [INFO][4748] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.809 [INFO][4757] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.809 [INFO][4757] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.809 [INFO][4757] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.815 [WARNING][4757] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.815 [INFO][4757] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" HandleID="k8s-pod-network.19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Workload="localhost-k8s-goldmane--666569f655--p6cd4-eth0" Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.816 [INFO][4757] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.820170 env[1202]: 2025-10-31 01:19:13.818 [INFO][4748] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4" Oct 31 01:19:13.820170 env[1202]: time="2025-10-31T01:19:13.820133826Z" level=info msg="TearDown network for sandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" successfully" Oct 31 01:19:13.823706 env[1202]: time="2025-10-31T01:19:13.823677476Z" level=info msg="RemovePodSandbox \"19a8cf67b02622f65de520d128c4dc45c359d5b1b2a24e209ce09ceca86bf9d4\" returns successfully" Oct 31 01:19:13.824157 env[1202]: time="2025-10-31T01:19:13.824127992Z" level=info msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" Oct 31 01:19:13.852564 env[1202]: time="2025-10-31T01:19:13.852531941Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:13.854264 env[1202]: time="2025-10-31T01:19:13.854224047Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:19:13.854887 kubelet[1938]: E1031 01:19:13.854646 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:19:13.854887 kubelet[1938]: E1031 01:19:13.854698 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:19:13.854887 kubelet[1938]: E1031 01:19:13.854828 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzf5k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-p6cd4_calico-system(c87c79af-530b-425e-a78b-abdafda90897): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:13.855970 kubelet[1938]: E1031 01:19:13.855912 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.855 [WARNING][4775] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c563bd83-bb8b-4ae5-aacd-c471087df722", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32", Pod:"coredns-668d6bf9bc-jhtwg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib92e20dbb4f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.856 [INFO][4775] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.856 [INFO][4775] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" iface="eth0" netns="" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.856 [INFO][4775] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.856 [INFO][4775] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.874 [INFO][4784] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.874 [INFO][4784] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.874 [INFO][4784] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.879 [WARNING][4784] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.879 [INFO][4784] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.880 [INFO][4784] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.884298 env[1202]: 2025-10-31 01:19:13.882 [INFO][4775] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.884683 env[1202]: time="2025-10-31T01:19:13.884317046Z" level=info msg="TearDown network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" successfully" Oct 31 01:19:13.884683 env[1202]: time="2025-10-31T01:19:13.884346471Z" level=info msg="StopPodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" returns successfully" Oct 31 01:19:13.884867 env[1202]: time="2025-10-31T01:19:13.884832462Z" level=info msg="RemovePodSandbox for \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" Oct 31 01:19:13.884917 env[1202]: time="2025-10-31T01:19:13.884873761Z" level=info msg="Forcibly stopping sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\"" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.913 [WARNING][4803] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c563bd83-bb8b-4ae5-aacd-c471087df722", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edf27d6f99b6386e442672a8d5f41e306fc40aebebdec2c486e4b65c549baf32", Pod:"coredns-668d6bf9bc-jhtwg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib92e20dbb4f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.914 [INFO][4803] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.914 [INFO][4803] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" iface="eth0" netns="" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.914 [INFO][4803] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.914 [INFO][4803] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.930 [INFO][4811] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.931 [INFO][4811] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.931 [INFO][4811] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.937 [WARNING][4811] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.937 [INFO][4811] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" HandleID="k8s-pod-network.b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Workload="localhost-k8s-coredns--668d6bf9bc--jhtwg-eth0" Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.938 [INFO][4811] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.941542 env[1202]: 2025-10-31 01:19:13.939 [INFO][4803] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b" Oct 31 01:19:13.941984 env[1202]: time="2025-10-31T01:19:13.941536315Z" level=info msg="TearDown network for sandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" successfully" Oct 31 01:19:13.944904 env[1202]: time="2025-10-31T01:19:13.944872657Z" level=info msg="RemovePodSandbox \"b3129a94198c7caf43983ef7ca4fb2cf1a6c8e7d32252947335b7771ea88573b\" returns successfully" Oct 31 01:19:13.945350 env[1202]: time="2025-10-31T01:19:13.945312493Z" level=info msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.971 [WARNING][4828] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a", Pod:"coredns-668d6bf9bc-6wb5j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6c04e8a1995", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.971 [INFO][4828] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.971 [INFO][4828] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" iface="eth0" netns="" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.971 [INFO][4828] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.971 [INFO][4828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.990 [INFO][4836] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.990 [INFO][4836] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.990 [INFO][4836] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.994 [WARNING][4836] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.994 [INFO][4836] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.996 [INFO][4836] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:13.999193 env[1202]: 2025-10-31 01:19:13.997 [INFO][4828] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:13.999687 env[1202]: time="2025-10-31T01:19:13.999225288Z" level=info msg="TearDown network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" successfully" Oct 31 01:19:13.999687 env[1202]: time="2025-10-31T01:19:13.999257288Z" level=info msg="StopPodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" returns successfully" Oct 31 01:19:13.999785 env[1202]: time="2025-10-31T01:19:13.999754300Z" level=info msg="RemovePodSandbox for \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" Oct 31 01:19:13.999828 env[1202]: time="2025-10-31T01:19:13.999793323Z" level=info msg="Forcibly stopping sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\"" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.026 [WARNING][4853] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"988ebf4f-1524-4f14-a6eb-f0cb2327f4d3", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"608e0f6b099e8f0fe6595fc3fc1822327940909dc81a18b1cd9b3382ca500e3a", Pod:"coredns-668d6bf9bc-6wb5j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6c04e8a1995", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.027 [INFO][4853] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.027 [INFO][4853] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" iface="eth0" netns="" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.027 [INFO][4853] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.027 [INFO][4853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.043 [INFO][4862] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.044 [INFO][4862] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.044 [INFO][4862] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.048 [WARNING][4862] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.048 [INFO][4862] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" HandleID="k8s-pod-network.2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Workload="localhost-k8s-coredns--668d6bf9bc--6wb5j-eth0" Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.049 [INFO][4862] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.053066 env[1202]: 2025-10-31 01:19:14.051 [INFO][4853] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b" Oct 31 01:19:14.053516 env[1202]: time="2025-10-31T01:19:14.053092290Z" level=info msg="TearDown network for sandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" successfully" Oct 31 01:19:14.056792 env[1202]: time="2025-10-31T01:19:14.056737211Z" level=info msg="RemovePodSandbox \"2d83f4a80adb89e8665a1d273f689be5682809a72c689375fc971698a235c80b\" returns successfully" Oct 31 01:19:14.057298 env[1202]: time="2025-10-31T01:19:14.057258159Z" level=info msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.083 [WARNING][4879] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"a85f13d0-1c09-4bed-b439-c5aa71c1b595", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571", Pod:"calico-apiserver-f875b9d54-q5nq9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60b42a61415", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.084 [INFO][4879] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.084 [INFO][4879] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" iface="eth0" netns="" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.084 [INFO][4879] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.084 [INFO][4879] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.100 [INFO][4888] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.100 [INFO][4888] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.100 [INFO][4888] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.106 [WARNING][4888] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.106 [INFO][4888] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.107 [INFO][4888] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.111138 env[1202]: 2025-10-31 01:19:14.109 [INFO][4879] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.111138 env[1202]: time="2025-10-31T01:19:14.111077854Z" level=info msg="TearDown network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" successfully" Oct 31 01:19:14.111138 env[1202]: time="2025-10-31T01:19:14.111106337Z" level=info msg="StopPodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" returns successfully" Oct 31 01:19:14.111863 env[1202]: time="2025-10-31T01:19:14.111589433Z" level=info msg="RemovePodSandbox for \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" Oct 31 01:19:14.111863 env[1202]: time="2025-10-31T01:19:14.111626372Z" level=info msg="Forcibly stopping sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\"" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.139 [WARNING][4907] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"a85f13d0-1c09-4bed-b439-c5aa71c1b595", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1200ac17d904caa72d51b5302a03c3d9c1d075e49c00373aaedead1dd97db571", Pod:"calico-apiserver-f875b9d54-q5nq9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60b42a61415", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.139 [INFO][4907] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.139 [INFO][4907] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" iface="eth0" netns="" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.139 [INFO][4907] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.139 [INFO][4907] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.156 [INFO][4916] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.156 [INFO][4916] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.156 [INFO][4916] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.162 [WARNING][4916] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.162 [INFO][4916] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" HandleID="k8s-pod-network.b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Workload="localhost-k8s-calico--apiserver--f875b9d54--q5nq9-eth0" Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.163 [INFO][4916] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.167391 env[1202]: 2025-10-31 01:19:14.165 [INFO][4907] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6" Oct 31 01:19:14.167391 env[1202]: time="2025-10-31T01:19:14.167365690Z" level=info msg="TearDown network for sandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" successfully" Oct 31 01:19:14.171031 env[1202]: time="2025-10-31T01:19:14.170973491Z" level=info msg="RemovePodSandbox \"b3cad3f1cb0b838afe31417001a0d531d1e3029590b5c9fda88eb3f1aeb3cba6\" returns successfully" Oct 31 01:19:14.171521 env[1202]: time="2025-10-31T01:19:14.171496824Z" level=info msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.201 [WARNING][4934] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0", GenerateName:"calico-kube-controllers-5d898459cb-", Namespace:"calico-system", SelfLink:"", UID:"0849090e-7f9a-48ac-8218-b70639608778", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d898459cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3", Pod:"calico-kube-controllers-5d898459cb-gjxrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc792e46cf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.201 [INFO][4934] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.201 [INFO][4934] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" iface="eth0" netns="" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.201 [INFO][4934] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.201 [INFO][4934] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.218 [INFO][4943] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.218 [INFO][4943] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.218 [INFO][4943] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.223 [WARNING][4943] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.223 [INFO][4943] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.225 [INFO][4943] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.228387 env[1202]: 2025-10-31 01:19:14.226 [INFO][4934] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.228833 env[1202]: time="2025-10-31T01:19:14.228432495Z" level=info msg="TearDown network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" successfully" Oct 31 01:19:14.228833 env[1202]: time="2025-10-31T01:19:14.228464095Z" level=info msg="StopPodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" returns successfully" Oct 31 01:19:14.228884 env[1202]: time="2025-10-31T01:19:14.228864697Z" level=info msg="RemovePodSandbox for \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" Oct 31 01:19:14.228930 env[1202]: time="2025-10-31T01:19:14.228891617Z" level=info msg="Forcibly stopping sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\"" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.258 [WARNING][4961] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0", GenerateName:"calico-kube-controllers-5d898459cb-", Namespace:"calico-system", SelfLink:"", UID:"0849090e-7f9a-48ac-8218-b70639608778", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d898459cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2b5ee956ca890715f03e59f5f39e8ef43405e8ba12b81143e6c5de7f77ee74a3", Pod:"calico-kube-controllers-5d898459cb-gjxrm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc792e46cf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.258 [INFO][4961] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.258 [INFO][4961] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" iface="eth0" netns="" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.258 [INFO][4961] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.258 [INFO][4961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.275 [INFO][4970] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.275 [INFO][4970] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.276 [INFO][4970] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.280 [WARNING][4970] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.280 [INFO][4970] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" HandleID="k8s-pod-network.943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Workload="localhost-k8s-calico--kube--controllers--5d898459cb--gjxrm-eth0" Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.281 [INFO][4970] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.284310 env[1202]: 2025-10-31 01:19:14.282 [INFO][4961] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e" Oct 31 01:19:14.284834 env[1202]: time="2025-10-31T01:19:14.284786547Z" level=info msg="TearDown network for sandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" successfully" Oct 31 01:19:14.288022 env[1202]: time="2025-10-31T01:19:14.287990660Z" level=info msg="RemovePodSandbox \"943f212d4bbb120bd0bd65e66d56002cff31ee7fb9078b429e779891556d235e\" returns successfully" Oct 31 01:19:14.288512 env[1202]: time="2025-10-31T01:19:14.288478125Z" level=info msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.315 [WARNING][4987] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"69bb3f27-4922-4932-a7d6-aa046762d839", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2", Pod:"calico-apiserver-f875b9d54-r2d8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8633940da1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.315 [INFO][4987] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.315 [INFO][4987] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" iface="eth0" netns="" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.315 [INFO][4987] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.315 [INFO][4987] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.335 [INFO][4996] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.335 [INFO][4996] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.335 [INFO][4996] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.340 [WARNING][4996] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.340 [INFO][4996] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.341 [INFO][4996] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.344752 env[1202]: 2025-10-31 01:19:14.343 [INFO][4987] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.345302 env[1202]: time="2025-10-31T01:19:14.345242245Z" level=info msg="TearDown network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" successfully" Oct 31 01:19:14.345302 env[1202]: time="2025-10-31T01:19:14.345289043Z" level=info msg="StopPodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" returns successfully" Oct 31 01:19:14.345768 env[1202]: time="2025-10-31T01:19:14.345735421Z" level=info msg="RemovePodSandbox for \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" Oct 31 01:19:14.345825 env[1202]: time="2025-10-31T01:19:14.345772400Z" level=info msg="Forcibly stopping sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\"" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.372 [WARNING][5015] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0", GenerateName:"calico-apiserver-f875b9d54-", Namespace:"calico-apiserver", SelfLink:"", UID:"69bb3f27-4922-4932-a7d6-aa046762d839", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f875b9d54", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4505bdeb4135b2c0256e470fa56ab542f2614ee5740d2a123f0cb6296a34fd2", Pod:"calico-apiserver-f875b9d54-r2d8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8633940da1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.372 [INFO][5015] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.372 [INFO][5015] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" iface="eth0" netns="" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.372 [INFO][5015] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.372 [INFO][5015] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.388 [INFO][5025] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.388 [INFO][5025] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.388 [INFO][5025] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.394 [WARNING][5025] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.394 [INFO][5025] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" HandleID="k8s-pod-network.a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Workload="localhost-k8s-calico--apiserver--f875b9d54--r2d8s-eth0" Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.395 [INFO][5025] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.399338 env[1202]: 2025-10-31 01:19:14.397 [INFO][5015] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148" Oct 31 01:19:14.399338 env[1202]: time="2025-10-31T01:19:14.399288264Z" level=info msg="TearDown network for sandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" successfully" Oct 31 01:19:14.402947 env[1202]: time="2025-10-31T01:19:14.402916343Z" level=info msg="RemovePodSandbox \"a983d8a94e329c7fd13835618ea8d284219f7c05c1e508a186e2a92373903148\" returns successfully" Oct 31 01:19:14.403435 env[1202]: time="2025-10-31T01:19:14.403382789Z" level=info msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.431 [WARNING][5044] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mxv8z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ce78460-3484-4444-8dae-aa63d95c2fad", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1", Pod:"csi-node-driver-mxv8z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63bb5990cca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.431 [INFO][5044] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.431 [INFO][5044] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" iface="eth0" netns="" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.431 [INFO][5044] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.431 [INFO][5044] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.448 [INFO][5052] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.448 [INFO][5052] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.448 [INFO][5052] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.453 [WARNING][5052] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.453 [INFO][5052] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.454 [INFO][5052] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.457577 env[1202]: 2025-10-31 01:19:14.455 [INFO][5044] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.458021 env[1202]: time="2025-10-31T01:19:14.457599429Z" level=info msg="TearDown network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" successfully" Oct 31 01:19:14.458021 env[1202]: time="2025-10-31T01:19:14.457631338Z" level=info msg="StopPodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" returns successfully" Oct 31 01:19:14.458135 env[1202]: time="2025-10-31T01:19:14.458092715Z" level=info msg="RemovePodSandbox for \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" Oct 31 01:19:14.458180 env[1202]: time="2025-10-31T01:19:14.458122681Z" level=info msg="Forcibly stopping sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\"" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.486 [WARNING][5070] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--mxv8z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ce78460-3484-4444-8dae-aa63d95c2fad", ResourceVersion:"1212", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ee1447477cb9275285defdd0601020c074ca4e4d5f8c99709c8c713f52798f1", Pod:"csi-node-driver-mxv8z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63bb5990cca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.486 [INFO][5070] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.486 [INFO][5070] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" iface="eth0" netns="" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.486 [INFO][5070] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.486 [INFO][5070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.506 [INFO][5079] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.507 [INFO][5079] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.507 [INFO][5079] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.511 [WARNING][5079] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.511 [INFO][5079] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" HandleID="k8s-pod-network.00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Workload="localhost-k8s-csi--node--driver--mxv8z-eth0" Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.512 [INFO][5079] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:14.515891 env[1202]: 2025-10-31 01:19:14.514 [INFO][5070] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab" Oct 31 01:19:14.516477 env[1202]: time="2025-10-31T01:19:14.515903359Z" level=info msg="TearDown network for sandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" successfully" Oct 31 01:19:14.519795 env[1202]: time="2025-10-31T01:19:14.519754917Z" level=info msg="RemovePodSandbox \"00aaec35faff3a618b7ffd3a11d28d0e43ba7654878bbb728c180816859f66ab\" returns successfully" Oct 31 01:19:17.538728 env[1202]: time="2025-10-31T01:19:17.538689843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:19:17.867673 env[1202]: time="2025-10-31T01:19:17.867556766Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:17.868709 env[1202]: time="2025-10-31T01:19:17.868660817Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:19:17.868852 kubelet[1938]: E1031 01:19:17.868807 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:17.869074 kubelet[1938]: E1031 01:19:17.868854 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:17.869074 kubelet[1938]: E1031 01:19:17.868976 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rd2vm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-f875b9d54-q5nq9_calico-apiserver(a85f13d0-1c09-4bed-b439-c5aa71c1b595): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:17.870184 kubelet[1938]: E1031 01:19:17.870147 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:19:18.501000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:18.501000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:18.501000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022a6800 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:18.501000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023e3560 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:18.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:18.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:18.501000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:18.501000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002616e40 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:18.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:18.501000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:19:18.501000 audit[1826]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002503820 a2=fc6 a3=0 items=0 ppid=1668 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c903 key=(null) Oct 31 01:19:18.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:19:18.727794 systemd[1]: Started sshd@15-10.0.0.142:22-10.0.0.1:55160.service. Oct 31 01:19:18.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.142:22-10.0.0.1:55160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:18.729541 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 31 01:19:18.729586 kernel: audit: type=1130 audit(1761873558.727:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.142:22-10.0.0.1:55160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:18.825000 audit[5093]: USER_ACCT pid=5093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.826376 sshd[5093]: Accepted publickey for core from 10.0.0.1 port 55160 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:18.832000 audit[5093]: CRED_ACQ pid=5093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.833434 kernel: audit: type=1101 audit(1761873558.825:1394): pid=5093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.833463 kernel: audit: type=1103 audit(1761873558.832:1395): pid=5093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.833472 sshd[5093]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:18.837539 systemd-logind[1193]: New session 16 of user core. Oct 31 01:19:18.839230 systemd[1]: Started session-16.scope. Oct 31 01:19:18.844886 kernel: audit: type=1006 audit(1761873558.832:1396): pid=5093 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 31 01:19:18.832000 audit[5093]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7a54530 a2=3 a3=0 items=0 ppid=1 pid=5093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:18.852096 kernel: audit: type=1300 audit(1761873558.832:1396): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde7a54530 a2=3 a3=0 items=0 ppid=1 pid=5093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:18.852130 kernel: audit: type=1327 audit(1761873558.832:1396): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:18.832000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:18.840000 audit[5093]: USER_START pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.862378 kernel: audit: type=1105 audit(1761873558.840:1397): pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.862444 kernel: audit: type=1103 audit(1761873558.844:1398): pid=5095 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.844000 audit[5095]: CRED_ACQ pid=5095 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.946814 sshd[5093]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:18.947000 audit[5093]: USER_END pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.949219 systemd[1]: sshd@15-10.0.0.142:22-10.0.0.1:55160.service: Deactivated successfully. Oct 31 01:19:18.949893 systemd[1]: session-16.scope: Deactivated successfully. Oct 31 01:19:18.950834 systemd-logind[1193]: Session 16 logged out. Waiting for processes to exit. Oct 31 01:19:18.951512 systemd-logind[1193]: Removed session 16. Oct 31 01:19:18.947000 audit[5093]: CRED_DISP pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.960776 kernel: audit: type=1106 audit(1761873558.947:1399): pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.960829 kernel: audit: type=1104 audit(1761873558.947:1400): pid=5093 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:18.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.142:22-10.0.0.1:55160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:22.538449 kubelet[1938]: E1031 01:19:22.538395 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:19:22.538895 kubelet[1938]: E1031 01:19:22.538859 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:19:22.698062 kubelet[1938]: E1031 01:19:22.697990 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:23.538790 kubelet[1938]: E1031 01:19:23.538751 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:19:23.539186 kubelet[1938]: E1031 01:19:23.539041 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:19:23.950678 systemd[1]: Started sshd@16-10.0.0.142:22-10.0.0.1:48840.service. Oct 31 01:19:23.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.142:22-10.0.0.1:48840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:23.952678 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:19:23.952761 kernel: audit: type=1130 audit(1761873563.950:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.142:22-10.0.0.1:48840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:23.987000 audit[5134]: USER_ACCT pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:23.988510 sshd[5134]: Accepted publickey for core from 10.0.0.1 port 48840 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:23.991020 sshd[5134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:23.995241 systemd-logind[1193]: New session 17 of user core. Oct 31 01:19:23.995714 systemd[1]: Started session-17.scope. Oct 31 01:19:23.990000 audit[5134]: CRED_ACQ pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.002698 kernel: audit: type=1101 audit(1761873563.987:1403): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.002749 kernel: audit: type=1103 audit(1761873563.990:1404): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.002768 kernel: audit: type=1006 audit(1761873563.990:1405): pid=5134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 31 01:19:23.990000 audit[5134]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd515c26c0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.014234 kernel: audit: type=1300 audit(1761873563.990:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd515c26c0 a2=3 a3=0 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.014276 kernel: audit: type=1327 audit(1761873563.990:1405): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:23.990000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:24.000000 audit[5134]: USER_START pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.024637 kernel: audit: type=1105 audit(1761873564.000:1406): pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.024690 kernel: audit: type=1103 audit(1761873564.001:1407): pid=5136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.001000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.100709 sshd[5134]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:24.101000 audit[5134]: USER_END pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.104026 systemd[1]: sshd@16-10.0.0.142:22-10.0.0.1:48840.service: Deactivated successfully. Oct 31 01:19:24.104693 systemd[1]: session-17.scope: Deactivated successfully. Oct 31 01:19:24.105259 systemd-logind[1193]: Session 17 logged out. Waiting for processes to exit. Oct 31 01:19:24.106454 systemd[1]: Started sshd@17-10.0.0.142:22-10.0.0.1:48848.service. Oct 31 01:19:24.107672 systemd-logind[1193]: Removed session 17. Oct 31 01:19:24.101000 audit[5134]: CRED_DISP pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.115738 kernel: audit: type=1106 audit(1761873564.101:1408): pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.115863 kernel: audit: type=1104 audit(1761873564.101:1409): pid=5134 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.142:22-10.0.0.1:48840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.142:22-10.0.0.1:48848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.142000 audit[5148]: USER_ACCT pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.143317 sshd[5148]: Accepted publickey for core from 10.0.0.1 port 48848 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:24.143000 audit[5148]: CRED_ACQ pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.143000 audit[5148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc32da6a30 a2=3 a3=0 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:24.144155 sshd[5148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:24.147590 systemd-logind[1193]: New session 18 of user core. Oct 31 01:19:24.148353 systemd[1]: Started session-18.scope. Oct 31 01:19:24.153000 audit[5148]: USER_START pid=5148 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.154000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.330106 sshd[5148]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:24.331000 audit[5148]: USER_END pid=5148 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.331000 audit[5148]: CRED_DISP pid=5148 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.333949 systemd[1]: Started sshd@18-10.0.0.142:22-10.0.0.1:48856.service. Oct 31 01:19:24.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.142:22-10.0.0.1:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.334616 systemd[1]: sshd@17-10.0.0.142:22-10.0.0.1:48848.service: Deactivated successfully. Oct 31 01:19:24.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.142:22-10.0.0.1:48848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.335288 systemd[1]: session-18.scope: Deactivated successfully. Oct 31 01:19:24.336112 systemd-logind[1193]: Session 18 logged out. Waiting for processes to exit. Oct 31 01:19:24.337064 systemd-logind[1193]: Removed session 18. Oct 31 01:19:24.370000 audit[5159]: USER_ACCT pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.371390 sshd[5159]: Accepted publickey for core from 10.0.0.1 port 48856 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:24.371000 audit[5159]: CRED_ACQ pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.371000 audit[5159]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fcda020 a2=3 a3=0 items=0 ppid=1 pid=5159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.371000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:24.372176 sshd[5159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:24.375583 systemd-logind[1193]: New session 19 of user core. Oct 31 01:19:24.376340 systemd[1]: Started session-19.scope. Oct 31 01:19:24.380000 audit[5159]: USER_START pid=5159 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.381000 audit[5162]: CRED_ACQ pid=5162 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.909000 audit[5174]: NETFILTER_CFG table=filter:122 family=2 entries=26 op=nft_register_rule pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.909000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd33925960 a2=0 a3=7ffd3392594c items=0 ppid=2045 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.914000 audit[5174]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.914000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd33925960 a2=0 a3=0 items=0 ppid=2045 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.921276 sshd[5159]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:24.922000 audit[5159]: USER_END pid=5159 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.922000 audit[5159]: CRED_DISP pid=5159 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.926088 systemd[1]: Started sshd@19-10.0.0.142:22-10.0.0.1:48864.service. Oct 31 01:19:24.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.142:22-10.0.0.1:48864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.927072 systemd[1]: sshd@18-10.0.0.142:22-10.0.0.1:48856.service: Deactivated successfully. Oct 31 01:19:24.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.142:22-10.0.0.1:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:24.927943 systemd[1]: session-19.scope: Deactivated successfully. Oct 31 01:19:24.929071 systemd-logind[1193]: Session 19 logged out. Waiting for processes to exit. Oct 31 01:19:24.930057 systemd-logind[1193]: Removed session 19. Oct 31 01:19:24.932000 audit[5179]: NETFILTER_CFG table=filter:124 family=2 entries=38 op=nft_register_rule pid=5179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.932000 audit[5179]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe3d65ae50 a2=0 a3=7ffe3d65ae3c items=0 ppid=2045 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.939000 audit[5179]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=5179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.939000 audit[5179]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3d65ae50 a2=0 a3=0 items=0 ppid=2045 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.964000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.964876 sshd[5177]: Accepted publickey for core from 10.0.0.1 port 48864 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:24.965000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.965000 audit[5177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7a50500 a2=3 a3=0 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:24.966126 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:24.969437 systemd-logind[1193]: New session 20 of user core. Oct 31 01:19:24.970355 systemd[1]: Started session-20.scope. Oct 31 01:19:24.973000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:24.974000 audit[5181]: CRED_ACQ pid=5181 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.189836 sshd[5177]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:25.190000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.190000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.193304 systemd[1]: Started sshd@20-10.0.0.142:22-10.0.0.1:48872.service. Oct 31 01:19:25.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.142:22-10.0.0.1:48872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:25.194479 systemd[1]: sshd@19-10.0.0.142:22-10.0.0.1:48864.service: Deactivated successfully. Oct 31 01:19:25.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.142:22-10.0.0.1:48864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:25.195057 systemd[1]: session-20.scope: Deactivated successfully. Oct 31 01:19:25.195695 systemd-logind[1193]: Session 20 logged out. Waiting for processes to exit. Oct 31 01:19:25.197927 systemd-logind[1193]: Removed session 20. Oct 31 01:19:25.231000 audit[5190]: USER_ACCT pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.232130 sshd[5190]: Accepted publickey for core from 10.0.0.1 port 48872 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:25.232000 audit[5190]: CRED_ACQ pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.232000 audit[5190]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc6119500 a2=3 a3=0 items=0 ppid=1 pid=5190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:25.232934 sshd[5190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:25.236216 systemd-logind[1193]: New session 21 of user core. Oct 31 01:19:25.237009 systemd[1]: Started session-21.scope. Oct 31 01:19:25.240000 audit[5190]: USER_START pid=5190 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.241000 audit[5193]: CRED_ACQ pid=5193 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.345978 sshd[5190]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:25.345000 audit[5190]: USER_END pid=5190 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.345000 audit[5190]: CRED_DISP pid=5190 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:25.349440 systemd[1]: sshd@20-10.0.0.142:22-10.0.0.1:48872.service: Deactivated successfully. Oct 31 01:19:25.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.142:22-10.0.0.1:48872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:25.350388 systemd[1]: session-21.scope: Deactivated successfully. Oct 31 01:19:25.351059 systemd-logind[1193]: Session 21 logged out. Waiting for processes to exit. Oct 31 01:19:25.351826 systemd-logind[1193]: Removed session 21. Oct 31 01:19:26.537806 kubelet[1938]: E1031 01:19:26.537762 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:28.538692 kubelet[1938]: E1031 01:19:28.538638 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:19:30.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.142:22-10.0.0.1:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:30.350600 systemd[1]: Started sshd@21-10.0.0.142:22-10.0.0.1:54502.service. Oct 31 01:19:30.352393 kernel: kauditd_printk_skb: 57 callbacks suppressed Oct 31 01:19:30.352466 kernel: audit: type=1130 audit(1761873570.349:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.142:22-10.0.0.1:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:30.385000 audit[5206]: USER_ACCT pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.386683 sshd[5206]: Accepted publickey for core from 10.0.0.1 port 54502 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:30.389867 sshd[5206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:30.388000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.393472 systemd-logind[1193]: New session 22 of user core. Oct 31 01:19:30.393499 systemd[1]: Started session-22.scope. Oct 31 01:19:30.399671 kernel: audit: type=1101 audit(1761873570.385:1452): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.399720 kernel: audit: type=1103 audit(1761873570.388:1453): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.399741 kernel: audit: type=1006 audit(1761873570.388:1454): pid=5206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 31 01:19:30.403589 kernel: audit: type=1300 audit(1761873570.388:1454): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff15dba560 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.388000 audit[5206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff15dba560 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.410422 kernel: audit: type=1327 audit(1761873570.388:1454): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:30.388000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:30.395000 audit[5206]: USER_START pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.420014 kernel: audit: type=1105 audit(1761873570.395:1455): pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.420055 kernel: audit: type=1103 audit(1761873570.397:1456): pid=5208 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.397000 audit[5208]: CRED_ACQ pid=5208 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.503884 sshd[5206]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:30.503000 audit[5206]: USER_END pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.506676 systemd[1]: sshd@21-10.0.0.142:22-10.0.0.1:54502.service: Deactivated successfully. Oct 31 01:19:30.507353 systemd[1]: session-22.scope: Deactivated successfully. Oct 31 01:19:30.508125 systemd-logind[1193]: Session 22 logged out. Waiting for processes to exit. Oct 31 01:19:30.508839 systemd-logind[1193]: Removed session 22. Oct 31 01:19:30.503000 audit[5206]: CRED_DISP pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.520239 kernel: audit: type=1106 audit(1761873570.503:1457): pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.520287 kernel: audit: type=1104 audit(1761873570.503:1458): pid=5206 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:30.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.142:22-10.0.0.1:54502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:31.017000 audit[5219]: NETFILTER_CFG table=filter:126 family=2 entries=26 op=nft_register_rule pid=5219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:31.017000 audit[5219]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3311cac0 a2=0 a3=7fff3311caac items=0 ppid=2045 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:31.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:31.022000 audit[5219]: NETFILTER_CFG table=nat:127 family=2 entries=104 op=nft_register_chain pid=5219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:31.022000 audit[5219]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff3311cac0 a2=0 a3=7fff3311caac items=0 ppid=2045 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:31.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:32.538091 kubelet[1938]: E1031 01:19:32.538031 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-q5nq9" podUID="a85f13d0-1c09-4bed-b439-c5aa71c1b595" Oct 31 01:19:33.538698 env[1202]: time="2025-10-31T01:19:33.538467347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:19:33.890204 env[1202]: time="2025-10-31T01:19:33.890076676Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:33.891144 env[1202]: time="2025-10-31T01:19:33.891107959Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:19:33.891297 kubelet[1938]: E1031 01:19:33.891254 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:19:33.891297 kubelet[1938]: E1031 01:19:33.891293 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:19:33.891598 kubelet[1938]: E1031 01:19:33.891398 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:668b603cd51348619f3f634744be88b6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:33.893273 env[1202]: time="2025-10-31T01:19:33.893234888Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:19:34.199727 env[1202]: time="2025-10-31T01:19:34.199679840Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:34.200657 env[1202]: time="2025-10-31T01:19:34.200615107Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:19:34.200854 kubelet[1938]: E1031 01:19:34.200808 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:19:34.200925 kubelet[1938]: E1031 01:19:34.200867 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:19:34.201018 kubelet[1938]: E1031 01:19:34.200972 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p5lf4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-85b86fb98d-wmtnx_calico-system(13e56bda-afc7-45c3-8a15-10fc2e6e0437): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:34.202422 kubelet[1938]: E1031 01:19:34.202366 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:19:34.538688 env[1202]: time="2025-10-31T01:19:34.538569229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:19:34.870689 env[1202]: time="2025-10-31T01:19:34.870589357Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:34.871690 env[1202]: time="2025-10-31T01:19:34.871622322Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:19:34.871851 kubelet[1938]: E1031 01:19:34.871807 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:34.871851 kubelet[1938]: E1031 01:19:34.871850 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:19:34.872039 kubelet[1938]: E1031 01:19:34.871965 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mqst5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-f875b9d54-r2d8s_calico-apiserver(69bb3f27-4922-4932-a7d6-aa046762d839): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:34.873199 kubelet[1938]: E1031 01:19:34.873155 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:19:35.508499 systemd[1]: Started sshd@22-10.0.0.142:22-10.0.0.1:54510.service. Oct 31 01:19:35.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.142:22-10.0.0.1:54510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:35.511444 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 01:19:35.511563 kernel: audit: type=1130 audit(1761873575.507:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.142:22-10.0.0.1:54510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:35.537479 kubelet[1938]: E1031 01:19:35.537438 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:35.539401 env[1202]: time="2025-10-31T01:19:35.539220352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:19:35.544000 audit[5221]: USER_ACCT pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.545899 sshd[5221]: Accepted publickey for core from 10.0.0.1 port 54510 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:35.549885 sshd[5221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:35.548000 audit[5221]: CRED_ACQ pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.554101 systemd[1]: Started session-23.scope. Oct 31 01:19:35.555205 systemd-logind[1193]: New session 23 of user core. Oct 31 01:19:35.559015 kernel: audit: type=1101 audit(1761873575.544:1463): pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.559078 kernel: audit: type=1103 audit(1761873575.548:1464): pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.548000 audit[5221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31a2b540 a2=3 a3=0 items=0 ppid=1 pid=5221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:35.571235 kernel: audit: type=1006 audit(1761873575.548:1465): pid=5221 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Oct 31 01:19:35.571295 kernel: audit: type=1300 audit(1761873575.548:1465): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31a2b540 a2=3 a3=0 items=0 ppid=1 pid=5221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:35.548000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:35.563000 audit[5221]: USER_START pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.581350 kernel: audit: type=1327 audit(1761873575.548:1465): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:35.581523 kernel: audit: type=1105 audit(1761873575.563:1466): pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.581547 kernel: audit: type=1103 audit(1761873575.564:1467): pid=5223 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.564000 audit[5223]: CRED_ACQ pid=5223 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.697568 sshd[5221]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:35.697000 audit[5221]: USER_END pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.699984 systemd[1]: sshd@22-10.0.0.142:22-10.0.0.1:54510.service: Deactivated successfully. Oct 31 01:19:35.700672 systemd[1]: session-23.scope: Deactivated successfully. Oct 31 01:19:35.701364 systemd-logind[1193]: Session 23 logged out. Waiting for processes to exit. Oct 31 01:19:35.702034 systemd-logind[1193]: Removed session 23. Oct 31 01:19:35.697000 audit[5221]: CRED_DISP pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.711634 kernel: audit: type=1106 audit(1761873575.697:1468): pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.711742 kernel: audit: type=1104 audit(1761873575.697:1469): pid=5221 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:35.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.142:22-10.0.0.1:54510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:35.923238 env[1202]: time="2025-10-31T01:19:35.923183453Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:35.924278 env[1202]: time="2025-10-31T01:19:35.924230703Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:19:35.924442 kubelet[1938]: E1031 01:19:35.924392 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:19:35.924517 kubelet[1938]: E1031 01:19:35.924450 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:19:35.924745 env[1202]: time="2025-10-31T01:19:35.924707500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:19:35.924815 kubelet[1938]: E1031 01:19:35.924752 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5sppz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5d898459cb-gjxrm_calico-system(0849090e-7f9a-48ac-8218-b70639608778): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:35.926088 kubelet[1938]: E1031 01:19:35.926047 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:19:36.243149 env[1202]: time="2025-10-31T01:19:36.243024960Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:36.244170 env[1202]: time="2025-10-31T01:19:36.244103540Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:19:36.244364 kubelet[1938]: E1031 01:19:36.244323 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:36.244430 kubelet[1938]: E1031 01:19:36.244376 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:36.244548 kubelet[1938]: E1031 01:19:36.244512 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:36.246542 env[1202]: time="2025-10-31T01:19:36.246514997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:19:36.577321 env[1202]: time="2025-10-31T01:19:36.577222374Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:36.578421 env[1202]: time="2025-10-31T01:19:36.578350789Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:19:36.578611 kubelet[1938]: E1031 01:19:36.578574 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:36.578840 kubelet[1938]: E1031 01:19:36.578620 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:36.578840 kubelet[1938]: E1031 01:19:36.578726 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jngkz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mxv8z_calico-system(1ce78460-3484-4444-8dae-aa63d95c2fad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:36.580756 kubelet[1938]: E1031 01:19:36.580721 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mxv8z" podUID="1ce78460-3484-4444-8dae-aa63d95c2fad" Oct 31 01:19:40.537338 kubelet[1938]: E1031 01:19:40.537304 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:40.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.142:22-10.0.0.1:35348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:40.702208 systemd[1]: Started sshd@23-10.0.0.142:22-10.0.0.1:35348.service. Oct 31 01:19:40.703879 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:19:40.703928 kernel: audit: type=1130 audit(1761873580.701:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.142:22-10.0.0.1:35348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:40.738000 audit[5242]: USER_ACCT pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.739509 sshd[5242]: Accepted publickey for core from 10.0.0.1 port 35348 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:40.745000 audit[5242]: CRED_ACQ pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.746343 sshd[5242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:40.749800 systemd-logind[1193]: New session 24 of user core. Oct 31 01:19:40.750499 systemd[1]: Started session-24.scope. Oct 31 01:19:40.752196 kernel: audit: type=1101 audit(1761873580.738:1472): pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.752297 kernel: audit: type=1103 audit(1761873580.745:1473): pid=5242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.752316 kernel: audit: type=1006 audit(1761873580.745:1474): pid=5242 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 31 01:19:40.745000 audit[5242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a95c920 a2=3 a3=0 items=0 ppid=1 pid=5242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.762746 kernel: audit: type=1300 audit(1761873580.745:1474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a95c920 a2=3 a3=0 items=0 ppid=1 pid=5242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.762787 kernel: audit: type=1327 audit(1761873580.745:1474): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:40.745000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:40.754000 audit[5242]: USER_START pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.772190 kernel: audit: type=1105 audit(1761873580.754:1475): pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.772232 kernel: audit: type=1103 audit(1761873580.755:1476): pid=5244 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.755000 audit[5244]: CRED_ACQ pid=5244 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.881625 sshd[5242]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:40.882000 audit[5242]: USER_END pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.884098 systemd[1]: sshd@23-10.0.0.142:22-10.0.0.1:35348.service: Deactivated successfully. Oct 31 01:19:40.884801 systemd[1]: session-24.scope: Deactivated successfully. Oct 31 01:19:40.885514 systemd-logind[1193]: Session 24 logged out. Waiting for processes to exit. Oct 31 01:19:40.886226 systemd-logind[1193]: Removed session 24. Oct 31 01:19:40.882000 audit[5242]: CRED_DISP pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.895739 kernel: audit: type=1106 audit(1761873580.882:1477): pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.895792 kernel: audit: type=1104 audit(1761873580.882:1478): pid=5242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:40.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.142:22-10.0.0.1:35348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:42.539158 env[1202]: time="2025-10-31T01:19:42.539070850Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:19:42.880595 env[1202]: time="2025-10-31T01:19:42.880460052Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:42.881505 env[1202]: time="2025-10-31T01:19:42.881436489Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:19:42.881661 kubelet[1938]: E1031 01:19:42.881621 1938 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:19:42.881927 kubelet[1938]: E1031 01:19:42.881669 1938 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:19:42.881927 kubelet[1938]: E1031 01:19:42.881799 1938 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzf5k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-p6cd4_calico-system(c87c79af-530b-425e-a78b-abdafda90897): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:42.883026 kubelet[1938]: E1031 01:19:42.882985 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-p6cd4" podUID="c87c79af-530b-425e-a78b-abdafda90897" Oct 31 01:19:45.886363 systemd[1]: Started sshd@24-10.0.0.142:22-10.0.0.1:35362.service. Oct 31 01:19:45.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.142:22-10.0.0.1:35362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:45.888365 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:19:45.888508 kernel: audit: type=1130 audit(1761873585.886:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.142:22-10.0.0.1:35362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:45.921000 audit[5256]: USER_ACCT pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.921873 sshd[5256]: Accepted publickey for core from 10.0.0.1 port 35362 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:19:45.923248 sshd[5256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:19:45.922000 audit[5256]: CRED_ACQ pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.931621 systemd[1]: Started session-25.scope. Oct 31 01:19:45.931901 systemd-logind[1193]: New session 25 of user core. Oct 31 01:19:45.934534 kernel: audit: type=1101 audit(1761873585.921:1481): pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.934585 kernel: audit: type=1103 audit(1761873585.922:1482): pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.938609 kernel: audit: type=1006 audit(1761873585.922:1483): pid=5256 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Oct 31 01:19:45.938655 kernel: audit: type=1300 audit(1761873585.922:1483): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe82eff050 a2=3 a3=0 items=0 ppid=1 pid=5256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:45.922000 audit[5256]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe82eff050 a2=3 a3=0 items=0 ppid=1 pid=5256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:45.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:45.947948 kernel: audit: type=1327 audit(1761873585.922:1483): proctitle=737368643A20636F7265205B707269765D Oct 31 01:19:45.947988 kernel: audit: type=1105 audit(1761873585.935:1484): pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.935000 audit[5256]: USER_START pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.955256 kernel: audit: type=1103 audit(1761873585.936:1485): pid=5258 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:45.936000 audit[5258]: CRED_ACQ pid=5258 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:46.054549 sshd[5256]: pam_unix(sshd:session): session closed for user core Oct 31 01:19:46.055000 audit[5256]: USER_END pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:46.057054 systemd[1]: sshd@24-10.0.0.142:22-10.0.0.1:35362.service: Deactivated successfully. Oct 31 01:19:46.057754 systemd[1]: session-25.scope: Deactivated successfully. Oct 31 01:19:46.058274 systemd-logind[1193]: Session 25 logged out. Waiting for processes to exit. Oct 31 01:19:46.058947 systemd-logind[1193]: Removed session 25. Oct 31 01:19:46.055000 audit[5256]: CRED_DISP pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:46.068886 kernel: audit: type=1106 audit(1761873586.055:1486): pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:46.068938 kernel: audit: type=1104 audit(1761873586.055:1487): pid=5256 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:19:46.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.142:22-10.0.0.1:35362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:19:46.538779 kubelet[1938]: E1031 01:19:46.538737 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5d898459cb-gjxrm" podUID="0849090e-7f9a-48ac-8218-b70639608778" Oct 31 01:19:47.538272 kubelet[1938]: E1031 01:19:47.538225 1938 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:47.539431 kubelet[1938]: E1031 01:19:47.539380 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-f875b9d54-r2d8s" podUID="69bb3f27-4922-4932-a7d6-aa046762d839" Oct 31 01:19:47.539711 env[1202]: time="2025-10-31T01:19:47.539391484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:19:47.540293 kubelet[1938]: E1031 01:19:47.540254 1938 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-85b86fb98d-wmtnx" podUID="13e56bda-afc7-45c3-8a15-10fc2e6e0437" Oct 31 01:19:47.879357 env[1202]: time="2025-10-31T01:19:47.879224077Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io