Oct 31 01:31:21.684659 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:31:21.684674 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:31:21.684680 kernel: Disabled fast string operations Oct 31 01:31:21.684684 kernel: BIOS-provided physical RAM map: Oct 31 01:31:21.684688 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 31 01:31:21.684692 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 31 01:31:21.684698 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 31 01:31:21.684702 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 31 01:31:21.684706 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 31 01:31:21.684710 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 31 01:31:21.684714 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 31 01:31:21.684718 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 31 01:31:21.684722 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 31 01:31:21.684726 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 31 01:31:21.684732 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 31 01:31:21.684737 kernel: NX (Execute Disable) protection: active Oct 31 01:31:21.684741 kernel: SMBIOS 2.7 present. Oct 31 01:31:21.684746 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 31 01:31:21.684750 kernel: vmware: hypercall mode: 0x00 Oct 31 01:31:21.684754 kernel: Hypervisor detected: VMware Oct 31 01:31:21.684760 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 31 01:31:21.684764 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 31 01:31:21.684769 kernel: vmware: using clock offset of 7778615893 ns Oct 31 01:31:21.684773 kernel: tsc: Detected 3408.000 MHz processor Oct 31 01:31:21.684778 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:31:21.684783 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:31:21.684787 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 31 01:31:21.684792 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:31:21.684796 kernel: total RAM covered: 3072M Oct 31 01:31:21.684802 kernel: Found optimal setting for mtrr clean up Oct 31 01:31:21.684807 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 31 01:31:21.684812 kernel: Using GB pages for direct mapping Oct 31 01:31:21.684816 kernel: ACPI: Early table checksum verification disabled Oct 31 01:31:21.684821 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 31 01:31:21.684825 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 31 01:31:21.684830 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 31 01:31:21.684834 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 31 01:31:21.684839 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:31:21.684843 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 31 01:31:21.684849 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 31 01:31:21.684856 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 31 01:31:21.684861 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 31 01:31:21.684865 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 31 01:31:21.684870 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 31 01:31:21.684876 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 31 01:31:21.684881 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 31 01:31:21.684886 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 31 01:31:21.684891 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:31:21.684895 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 31 01:31:21.684901 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 31 01:31:21.684905 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 31 01:31:21.684910 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 31 01:31:21.684915 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 31 01:31:21.684921 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 31 01:31:21.684926 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 31 01:31:21.684931 kernel: system APIC only can use physical flat Oct 31 01:31:21.684935 kernel: Setting APIC routing to physical flat. Oct 31 01:31:21.684940 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 01:31:21.684945 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 01:31:21.684950 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 01:31:21.684954 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 01:31:21.684959 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 01:31:21.684964 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 01:31:21.684969 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 01:31:21.684974 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 01:31:21.684979 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 31 01:31:21.684984 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 31 01:31:21.684988 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 31 01:31:21.684993 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 31 01:31:21.684998 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 31 01:31:21.685003 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 31 01:31:21.685008 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 31 01:31:21.685013 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 31 01:31:21.685018 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 31 01:31:21.685023 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 31 01:31:21.685027 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 31 01:31:21.685032 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 31 01:31:21.685037 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 31 01:31:21.685042 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 31 01:31:21.685046 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 31 01:31:21.685051 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 31 01:31:21.685056 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 31 01:31:21.685062 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 31 01:31:21.685067 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 31 01:31:21.685071 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 31 01:31:21.685076 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 31 01:31:21.685081 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 31 01:31:21.685086 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 31 01:31:21.685091 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 31 01:31:21.685095 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 31 01:31:21.685100 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 31 01:31:21.685105 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 31 01:31:21.685111 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 31 01:31:21.685116 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 31 01:31:21.685120 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 31 01:31:21.685125 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 31 01:31:21.685130 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 31 01:31:21.685134 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 31 01:31:21.685139 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 31 01:31:21.685144 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 31 01:31:21.685148 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 31 01:31:21.685153 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 31 01:31:21.685160 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 31 01:31:21.685164 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 31 01:31:21.685169 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 31 01:31:21.685174 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 31 01:31:21.685179 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 31 01:31:21.685183 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 31 01:31:21.685188 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 31 01:31:21.685193 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 31 01:31:21.685197 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 31 01:31:21.685202 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 31 01:31:21.685208 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 31 01:31:21.685212 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 31 01:31:21.685217 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 31 01:31:21.685222 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 31 01:31:21.685227 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 31 01:31:21.685232 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 31 01:31:21.685240 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 31 01:31:21.685246 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 31 01:31:21.685251 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 31 01:31:21.685256 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 31 01:31:21.685263 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 31 01:31:21.685268 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 31 01:31:21.685273 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 31 01:31:21.685278 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 31 01:31:21.685283 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 31 01:31:21.685289 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 31 01:31:21.685294 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 31 01:31:21.685299 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 31 01:31:21.685310 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 31 01:31:21.686342 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 31 01:31:21.690503 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 31 01:31:21.690510 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 31 01:31:21.690516 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 31 01:31:21.690522 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 31 01:31:21.690527 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 31 01:31:21.690532 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 31 01:31:21.690538 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 31 01:31:21.690546 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 31 01:31:21.690551 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 31 01:31:21.690557 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 31 01:31:21.690562 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 31 01:31:21.690567 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 31 01:31:21.690572 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 31 01:31:21.690577 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 31 01:31:21.690583 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 31 01:31:21.690588 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 31 01:31:21.690593 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 31 01:31:21.690600 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 31 01:31:21.690605 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 31 01:31:21.690610 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 31 01:31:21.690615 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 31 01:31:21.690620 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 31 01:31:21.690626 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 31 01:31:21.690631 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 31 01:31:21.690636 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 31 01:31:21.690641 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 31 01:31:21.690646 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 31 01:31:21.690653 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 31 01:31:21.690658 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 31 01:31:21.690664 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 31 01:31:21.690669 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 31 01:31:21.690674 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 31 01:31:21.690679 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 31 01:31:21.690684 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 31 01:31:21.690690 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 31 01:31:21.690695 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 31 01:31:21.690701 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 31 01:31:21.690706 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 31 01:31:21.690711 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 31 01:31:21.690716 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 31 01:31:21.690722 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 31 01:31:21.690727 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 31 01:31:21.690732 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 31 01:31:21.690737 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 31 01:31:21.690742 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 31 01:31:21.690747 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 31 01:31:21.690754 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 31 01:31:21.690759 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 31 01:31:21.690764 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 31 01:31:21.690770 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 31 01:31:21.690775 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 31 01:31:21.690780 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 31 01:31:21.690785 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 31 01:31:21.690790 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 01:31:21.690796 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 01:31:21.690801 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 31 01:31:21.690808 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 31 01:31:21.690814 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 31 01:31:21.690820 kernel: Zone ranges: Oct 31 01:31:21.690825 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:31:21.690830 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 31 01:31:21.690835 kernel: Normal empty Oct 31 01:31:21.690841 kernel: Movable zone start for each node Oct 31 01:31:21.690846 kernel: Early memory node ranges Oct 31 01:31:21.690851 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 31 01:31:21.690858 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 31 01:31:21.690863 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 31 01:31:21.690869 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 31 01:31:21.690874 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:31:21.690879 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 31 01:31:21.690885 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 31 01:31:21.690890 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 31 01:31:21.690895 kernel: system APIC only can use physical flat Oct 31 01:31:21.690901 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 31 01:31:21.690906 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 31 01:31:21.690913 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 31 01:31:21.690918 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 31 01:31:21.690923 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 31 01:31:21.690928 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 31 01:31:21.690934 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 31 01:31:21.690939 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 31 01:31:21.690944 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 31 01:31:21.690950 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 31 01:31:21.690955 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 31 01:31:21.690962 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 31 01:31:21.690967 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 31 01:31:21.690972 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 31 01:31:21.690977 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 31 01:31:21.690982 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 31 01:31:21.690987 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 31 01:31:21.690993 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 31 01:31:21.690998 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 31 01:31:21.691003 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 31 01:31:21.691009 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 31 01:31:21.691015 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 31 01:31:21.691021 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 31 01:31:21.691026 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 31 01:31:21.691031 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 31 01:31:21.691036 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 31 01:31:21.691041 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 31 01:31:21.691047 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 31 01:31:21.691052 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 31 01:31:21.691057 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 31 01:31:21.691063 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 31 01:31:21.691068 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 31 01:31:21.691074 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 31 01:31:21.691079 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 31 01:31:21.691084 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 31 01:31:21.691089 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 31 01:31:21.691094 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 31 01:31:21.691100 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 31 01:31:21.691105 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 31 01:31:21.691111 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 31 01:31:21.691117 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 31 01:31:21.691122 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 31 01:31:21.691127 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 31 01:31:21.691132 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 31 01:31:21.691138 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 31 01:31:21.691143 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 31 01:31:21.691148 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 31 01:31:21.691153 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 31 01:31:21.691159 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 31 01:31:21.691165 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 31 01:31:21.691170 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 31 01:31:21.691175 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 31 01:31:21.691180 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 31 01:31:21.691186 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 31 01:31:21.691191 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 31 01:31:21.691196 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 31 01:31:21.691201 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 31 01:31:21.691206 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 31 01:31:21.691213 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 31 01:31:21.691218 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 31 01:31:21.691223 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 31 01:31:21.691228 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 31 01:31:21.691233 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 31 01:31:21.691238 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 31 01:31:21.691244 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 31 01:31:21.691249 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 31 01:31:21.691254 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 31 01:31:21.691260 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 31 01:31:21.691266 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 31 01:31:21.691271 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 31 01:31:21.691276 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 31 01:31:21.691281 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 31 01:31:21.691286 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 31 01:31:21.691292 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 31 01:31:21.691297 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 31 01:31:21.691302 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 31 01:31:21.691326 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 31 01:31:21.691333 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 31 01:31:21.691338 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 31 01:31:21.691343 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 31 01:31:21.691348 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 31 01:31:21.691354 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 31 01:31:21.691359 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 31 01:31:21.691364 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 31 01:31:21.691369 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 31 01:31:21.691374 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 31 01:31:21.691381 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 31 01:31:21.691386 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 31 01:31:21.691392 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 31 01:31:21.691397 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 31 01:31:21.691402 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 31 01:31:21.691407 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 31 01:31:21.691412 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 31 01:31:21.691417 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 31 01:31:21.691423 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 31 01:31:21.691429 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 31 01:31:21.691434 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 31 01:31:21.691439 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 31 01:31:21.691445 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 31 01:31:21.691450 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 31 01:31:21.691455 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 31 01:31:21.691460 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 31 01:31:21.691465 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 31 01:31:21.691471 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 31 01:31:21.691476 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 31 01:31:21.691482 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 31 01:31:21.691488 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 31 01:31:21.691493 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 31 01:31:21.691498 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 31 01:31:21.691509 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 31 01:31:21.691515 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 31 01:31:21.691520 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 31 01:31:21.691525 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 31 01:31:21.691530 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 31 01:31:21.691537 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 31 01:31:21.691542 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 31 01:31:21.691547 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 31 01:31:21.691552 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 31 01:31:21.691558 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 31 01:31:21.691563 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 31 01:31:21.691568 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 31 01:31:21.691574 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 31 01:31:21.691579 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 31 01:31:21.691585 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 31 01:31:21.691591 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 31 01:31:21.691596 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 31 01:31:21.691602 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 31 01:31:21.691607 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 31 01:31:21.691612 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:31:21.691617 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 31 01:31:21.691623 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:31:21.691628 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 31 01:31:21.691633 kernel: TSC deadline timer available Oct 31 01:31:21.691639 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 31 01:31:21.691645 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 31 01:31:21.691650 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 31 01:31:21.691655 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:31:21.691661 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 31 01:31:21.691666 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 01:31:21.691672 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 01:31:21.691677 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 31 01:31:21.691682 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 31 01:31:21.691689 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 31 01:31:21.691694 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 31 01:31:21.691699 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 31 01:31:21.691704 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 31 01:31:21.691709 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 31 01:31:21.691723 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 31 01:31:21.691730 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 31 01:31:21.691735 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 31 01:31:21.691742 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 31 01:31:21.691748 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 31 01:31:21.691754 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 31 01:31:21.691760 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 31 01:31:21.691765 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 31 01:31:21.691771 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 31 01:31:21.691776 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 31 01:31:21.691782 kernel: Policy zone: DMA32 Oct 31 01:31:21.691788 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:31:21.691796 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:31:21.691801 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 31 01:31:21.691807 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 31 01:31:21.691812 kernel: printk: log_buf_len min size: 262144 bytes Oct 31 01:31:21.691818 kernel: printk: log_buf_len: 1048576 bytes Oct 31 01:31:21.691824 kernel: printk: early log buf free: 239728(91%) Oct 31 01:31:21.691830 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:31:21.691835 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 01:31:21.691843 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:31:21.691849 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 155976K reserved, 0K cma-reserved) Oct 31 01:31:21.691855 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 31 01:31:21.691861 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:31:21.691867 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:31:21.691874 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:31:21.691882 kernel: rcu: RCU event tracing is enabled. Oct 31 01:31:21.691888 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 31 01:31:21.691894 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:31:21.691899 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:31:21.691905 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:31:21.691911 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 31 01:31:21.691917 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 31 01:31:21.691922 kernel: random: crng init done Oct 31 01:31:21.691928 kernel: Console: colour VGA+ 80x25 Oct 31 01:31:21.691935 kernel: printk: console [tty0] enabled Oct 31 01:31:21.691940 kernel: printk: console [ttyS0] enabled Oct 31 01:31:21.691946 kernel: ACPI: Core revision 20210730 Oct 31 01:31:21.691952 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 31 01:31:21.691958 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:31:21.691965 kernel: x2apic enabled Oct 31 01:31:21.691971 kernel: Switched APIC routing to physical x2apic. Oct 31 01:31:21.691977 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:31:21.691983 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:31:21.691990 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 31 01:31:21.691996 kernel: Disabled fast string operations Oct 31 01:31:21.692001 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 31 01:31:21.692007 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Oct 31 01:31:21.692013 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:31:21.692019 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 31 01:31:21.692025 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Oct 31 01:31:21.692031 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Oct 31 01:31:21.692036 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Oct 31 01:31:21.692043 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 31 01:31:21.692049 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 31 01:31:21.692055 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:31:21.692060 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:31:21.692066 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 31 01:31:21.692072 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 31 01:31:21.692077 kernel: GDS: Unknown: Dependent on hypervisor status Oct 31 01:31:21.692083 kernel: active return thunk: its_return_thunk Oct 31 01:31:21.692090 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 01:31:21.692095 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:31:21.692101 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:31:21.692107 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:31:21.692113 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:31:21.692118 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 31 01:31:21.692124 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:31:21.692130 kernel: pid_max: default: 131072 minimum: 1024 Oct 31 01:31:21.692135 kernel: LSM: Security Framework initializing Oct 31 01:31:21.692142 kernel: SELinux: Initializing. Oct 31 01:31:21.692148 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:31:21.692154 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 01:31:21.692159 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 31 01:31:21.692165 kernel: Performance Events: Skylake events, core PMU driver. Oct 31 01:31:21.692171 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 31 01:31:21.692176 kernel: core: CPUID marked event: 'instructions' unavailable Oct 31 01:31:21.692182 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 31 01:31:21.692188 kernel: core: CPUID marked event: 'cache references' unavailable Oct 31 01:31:21.692194 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 31 01:31:21.692200 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 31 01:31:21.692205 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 31 01:31:21.692211 kernel: ... version: 1 Oct 31 01:31:21.692217 kernel: ... bit width: 48 Oct 31 01:31:21.692222 kernel: ... generic registers: 4 Oct 31 01:31:21.692228 kernel: ... value mask: 0000ffffffffffff Oct 31 01:31:21.692234 kernel: ... max period: 000000007fffffff Oct 31 01:31:21.692240 kernel: ... fixed-purpose events: 0 Oct 31 01:31:21.692247 kernel: ... event mask: 000000000000000f Oct 31 01:31:21.692252 kernel: signal: max sigframe size: 1776 Oct 31 01:31:21.692258 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:31:21.692264 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 01:31:21.692270 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:31:21.692276 kernel: x86: Booting SMP configuration: Oct 31 01:31:21.692281 kernel: .... node #0, CPUs: #1 Oct 31 01:31:21.692287 kernel: Disabled fast string operations Oct 31 01:31:21.692293 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 31 01:31:21.692298 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 01:31:21.692305 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 01:31:21.694618 kernel: smpboot: Max logical packages: 128 Oct 31 01:31:21.694625 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 31 01:31:21.694632 kernel: devtmpfs: initialized Oct 31 01:31:21.694638 kernel: x86/mm: Memory block size: 128MB Oct 31 01:31:21.694643 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 31 01:31:21.694649 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:31:21.694655 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 31 01:31:21.694661 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:31:21.694675 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:31:21.694681 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:31:21.694687 kernel: audit: type=2000 audit(1761874280.085:1): state=initialized audit_enabled=0 res=1 Oct 31 01:31:21.694693 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:31:21.694699 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:31:21.694705 kernel: cpuidle: using governor menu Oct 31 01:31:21.694711 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 31 01:31:21.694716 kernel: ACPI: bus type PCI registered Oct 31 01:31:21.694722 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:31:21.694729 kernel: dca service started, version 1.12.1 Oct 31 01:31:21.694735 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 31 01:31:21.694741 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 31 01:31:21.694746 kernel: PCI: Using configuration type 1 for base access Oct 31 01:31:21.694755 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:31:21.694761 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:31:21.694766 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:31:21.694772 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:31:21.694778 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:31:21.694785 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:31:21.694790 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:31:21.694796 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:31:21.694802 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:31:21.694808 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:31:21.694813 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 31 01:31:21.694819 kernel: ACPI: Interpreter enabled Oct 31 01:31:21.694825 kernel: ACPI: PM: (supports S0 S1 S5) Oct 31 01:31:21.694830 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:31:21.694837 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:31:21.694843 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 31 01:31:21.694849 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 31 01:31:21.694951 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:31:21.695003 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 31 01:31:21.695050 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 31 01:31:21.695058 kernel: PCI host bridge to bus 0000:00 Oct 31 01:31:21.695110 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:31:21.695153 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Oct 31 01:31:21.695195 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:31:21.695236 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:31:21.695278 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 31 01:31:21.695333 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 31 01:31:21.695396 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 31 01:31:21.695460 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 31 01:31:21.695529 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 31 01:31:21.695585 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 31 01:31:21.695634 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 31 01:31:21.695682 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 31 01:31:21.695729 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 31 01:31:21.695779 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 31 01:31:21.695826 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 31 01:31:21.695878 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 31 01:31:21.695927 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 31 01:31:21.695974 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 31 01:31:21.696026 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 31 01:31:21.696076 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 31 01:31:21.696123 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 31 01:31:21.696175 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 31 01:31:21.696222 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 31 01:31:21.696270 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 31 01:31:21.699058 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 31 01:31:21.699123 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 31 01:31:21.699177 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:31:21.699232 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 31 01:31:21.699286 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.699343 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.699400 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.699451 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.699508 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.699562 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.699614 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.699662 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.699712 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.704914 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.704984 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.705040 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.705093 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.705143 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.705207 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.705303 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.708648 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.708711 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.708772 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.708823 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.708877 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.708926 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.708984 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.709061 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.709147 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.709202 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.709254 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.709303 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.709753 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.709809 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.709863 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.709912 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.709982 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.710057 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.710145 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.710227 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.710686 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.710783 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.710863 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.710950 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711008 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711062 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711116 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711165 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711217 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711266 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711474 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711541 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711595 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711645 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711698 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711747 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711804 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.711863 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.711942 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.712016 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.712098 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.712181 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.712267 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.713895 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.713976 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.714050 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.714132 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 31 01:31:21.714208 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.714291 kernel: pci_bus 0000:01: extended config space not accessible Oct 31 01:31:21.715698 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:31:21.715766 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 01:31:21.715776 kernel: acpiphp: Slot [32] registered Oct 31 01:31:21.715783 kernel: acpiphp: Slot [33] registered Oct 31 01:31:21.715789 kernel: acpiphp: Slot [34] registered Oct 31 01:31:21.715794 kernel: acpiphp: Slot [35] registered Oct 31 01:31:21.715800 kernel: acpiphp: Slot [36] registered Oct 31 01:31:21.715809 kernel: acpiphp: Slot [37] registered Oct 31 01:31:21.715818 kernel: acpiphp: Slot [38] registered Oct 31 01:31:21.715829 kernel: acpiphp: Slot [39] registered Oct 31 01:31:21.715838 kernel: acpiphp: Slot [40] registered Oct 31 01:31:21.715846 kernel: acpiphp: Slot [41] registered Oct 31 01:31:21.715855 kernel: acpiphp: Slot [42] registered Oct 31 01:31:21.715863 kernel: acpiphp: Slot [43] registered Oct 31 01:31:21.715872 kernel: acpiphp: Slot [44] registered Oct 31 01:31:21.715881 kernel: acpiphp: Slot [45] registered Oct 31 01:31:21.715890 kernel: acpiphp: Slot [46] registered Oct 31 01:31:21.715899 kernel: acpiphp: Slot [47] registered Oct 31 01:31:21.715907 kernel: acpiphp: Slot [48] registered Oct 31 01:31:21.715918 kernel: acpiphp: Slot [49] registered Oct 31 01:31:21.715928 kernel: acpiphp: Slot [50] registered Oct 31 01:31:21.715936 kernel: acpiphp: Slot [51] registered Oct 31 01:31:21.715945 kernel: acpiphp: Slot [52] registered Oct 31 01:31:21.715953 kernel: acpiphp: Slot [53] registered Oct 31 01:31:21.715962 kernel: acpiphp: Slot [54] registered Oct 31 01:31:21.715971 kernel: acpiphp: Slot [55] registered Oct 31 01:31:21.715980 kernel: acpiphp: Slot [56] registered Oct 31 01:31:21.715988 kernel: acpiphp: Slot [57] registered Oct 31 01:31:21.715999 kernel: acpiphp: Slot [58] registered Oct 31 01:31:21.716007 kernel: acpiphp: Slot [59] registered Oct 31 01:31:21.716016 kernel: acpiphp: Slot [60] registered Oct 31 01:31:21.716024 kernel: acpiphp: Slot [61] registered Oct 31 01:31:21.716034 kernel: acpiphp: Slot [62] registered Oct 31 01:31:21.716044 kernel: acpiphp: Slot [63] registered Oct 31 01:31:21.716118 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 31 01:31:21.716194 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:31:21.716245 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:31:21.716296 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:31:21.719466 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 31 01:31:21.719535 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Oct 31 01:31:21.719587 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 31 01:31:21.719635 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 31 01:31:21.719683 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 31 01:31:21.719739 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 31 01:31:21.719794 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 31 01:31:21.719843 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 31 01:31:21.719891 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:31:21.719940 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 31 01:31:21.719990 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:31:21.720040 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:31:21.720088 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:31:21.720135 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:31:21.720187 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:31:21.720234 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:31:21.720281 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:31:21.720343 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:31:21.720395 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:31:21.720443 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:31:21.720511 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:31:21.720587 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:31:21.720662 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:31:21.720741 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:31:21.720808 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:31:21.720862 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:31:21.720910 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:31:21.720957 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:31:21.721010 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:31:21.721058 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:31:21.721104 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:31:21.721155 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:31:21.721720 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:31:21.721781 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:31:21.721834 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:31:21.721883 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:31:21.721931 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:31:21.721987 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 31 01:31:21.722036 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 31 01:31:21.722085 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 31 01:31:21.722133 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 31 01:31:21.722184 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 31 01:31:21.722233 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 31 01:31:21.722283 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 31 01:31:21.722661 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 31 01:31:21.722742 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 31 01:31:21.722824 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:31:21.722877 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:31:21.722926 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:31:21.722979 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:31:21.723027 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:31:21.723074 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:31:21.723122 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:31:21.723171 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:31:21.723219 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:31:21.723267 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:31:21.723475 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:31:21.723552 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:31:21.723617 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:31:21.723668 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:31:21.723717 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:31:21.723765 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:31:21.723813 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:31:21.723862 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:31:21.723912 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:31:21.723959 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:31:21.724007 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:31:21.724054 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:31:21.724101 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:31:21.724150 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:31:21.724196 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:31:21.724244 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:31:21.724294 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:31:21.724350 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:31:21.724397 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:31:21.724443 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:31:21.724492 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:31:21.724545 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:31:21.724594 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:31:21.724640 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:31:21.724692 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:31:21.724740 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:31:21.724786 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:31:21.724832 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:31:21.724882 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:31:21.724928 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:31:21.724974 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:31:21.725025 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:31:21.725071 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:31:21.725119 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:31:21.725168 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:31:21.725215 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:31:21.725262 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:31:21.725640 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:31:21.725705 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:31:21.725785 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:31:21.725862 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:31:21.725935 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:31:21.726008 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:31:21.726076 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:31:21.726140 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:31:21.726190 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:31:21.726238 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:31:21.726291 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:31:21.726517 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:31:21.726569 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:31:21.726617 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:31:21.727005 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:31:21.727064 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:31:21.727115 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:31:21.727167 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:31:21.727373 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:31:21.727424 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:31:21.727475 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:31:21.727867 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:31:21.727950 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:31:21.728004 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:31:21.728054 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:31:21.728102 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:31:21.728156 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:31:21.728204 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:31:21.728251 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:31:21.728301 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:31:21.728426 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:31:21.728473 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:31:21.728482 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 31 01:31:21.728488 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 31 01:31:21.728495 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 31 01:31:21.728501 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:31:21.728512 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 31 01:31:21.728518 kernel: iommu: Default domain type: Translated Oct 31 01:31:21.728524 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:31:21.728571 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 31 01:31:21.728619 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:31:21.728665 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 31 01:31:21.728673 kernel: vgaarb: loaded Oct 31 01:31:21.728681 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:31:21.728687 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:31:21.728694 kernel: PTP clock support registered Oct 31 01:31:21.728703 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:31:21.728713 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:31:21.728723 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 31 01:31:21.728731 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 31 01:31:21.728741 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 31 01:31:21.728750 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 31 01:31:21.728763 kernel: clocksource: Switched to clocksource tsc-early Oct 31 01:31:21.728772 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:31:21.728778 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:31:21.728784 kernel: pnp: PnP ACPI init Oct 31 01:31:21.728862 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 31 01:31:21.728915 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 31 01:31:21.728960 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 31 01:31:21.729007 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 31 01:31:21.729058 kernel: pnp 00:06: [dma 2] Oct 31 01:31:21.729105 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 31 01:31:21.729149 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 31 01:31:21.729192 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 31 01:31:21.729200 kernel: pnp: PnP ACPI: found 8 devices Oct 31 01:31:21.729206 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:31:21.729212 kernel: NET: Registered PF_INET protocol family Oct 31 01:31:21.729220 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:31:21.729226 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 01:31:21.729231 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:31:21.729237 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 01:31:21.729244 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 01:31:21.729249 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 01:31:21.729255 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:31:21.729261 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 01:31:21.729266 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:31:21.729273 kernel: NET: Registered PF_XDP protocol family Oct 31 01:31:21.729338 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 31 01:31:21.729393 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 01:31:21.729444 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 01:31:21.729493 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 01:31:21.729543 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 01:31:21.729597 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 31 01:31:21.729647 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 31 01:31:21.729696 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 31 01:31:21.729746 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 31 01:31:21.729796 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 31 01:31:21.729846 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 31 01:31:21.729897 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 31 01:31:21.729947 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 31 01:31:21.729996 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 31 01:31:21.730046 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 31 01:31:21.730096 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 31 01:31:21.730144 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 31 01:31:21.730197 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 31 01:31:21.730246 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 31 01:31:21.730294 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 31 01:31:21.730359 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 31 01:31:21.730432 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 31 01:31:21.730508 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 31 01:31:21.730591 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:31:21.730644 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:31:21.730694 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.730743 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.730792 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.730839 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.730888 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.730939 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.730986 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731091 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.731223 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731336 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.731388 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731435 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.731484 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731544 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.731830 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731892 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.731942 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.731992 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.732040 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.732402 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.732458 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.732511 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.732560 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.732881 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.732939 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.732990 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.733059 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.734582 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.734647 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.735006 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.735061 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.735112 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.735472 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.735548 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.735618 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.735865 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.735936 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736175 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736231 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736280 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736364 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736413 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736462 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736509 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736556 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736603 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736654 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736701 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736749 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736797 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736846 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736894 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.736942 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.736990 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.737040 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.737090 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.737140 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.737189 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.737241 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.737289 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.737626 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.737949 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738042 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738098 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738168 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738235 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738286 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738374 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738427 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738475 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738530 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738580 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738631 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738679 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738731 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738780 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738829 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738878 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.738929 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.738978 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.739027 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.739076 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.739125 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 31 01:31:21.739174 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 31 01:31:21.739226 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 31 01:31:21.739277 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 31 01:31:21.739665 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 31 01:31:21.739722 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 31 01:31:21.739887 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:31:21.739951 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 31 01:31:21.740005 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 31 01:31:21.740055 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 31 01:31:21.740367 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 31 01:31:21.740422 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:31:21.740473 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 31 01:31:21.740544 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 31 01:31:21.740844 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 31 01:31:21.740900 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:31:21.740951 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 31 01:31:21.741000 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 31 01:31:21.741048 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 31 01:31:21.741098 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:31:21.741148 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 31 01:31:21.741194 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 31 01:31:21.741240 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:31:21.741288 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 31 01:31:21.741345 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 31 01:31:21.741393 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:31:21.741445 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 31 01:31:21.741492 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 31 01:31:21.741546 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:31:21.741594 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 31 01:31:21.741641 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 31 01:31:21.741688 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:31:21.741737 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 31 01:31:21.742017 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 31 01:31:21.742098 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:31:21.742185 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 31 01:31:21.742596 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 31 01:31:21.742655 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 31 01:31:21.742840 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 31 01:31:21.742894 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:31:21.742946 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 31 01:31:21.742994 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 31 01:31:21.743394 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 31 01:31:21.743447 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:31:21.743502 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 31 01:31:21.743571 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 31 01:31:21.743926 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 31 01:31:21.743983 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:31:21.744035 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 31 01:31:21.744085 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 31 01:31:21.744415 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:31:21.744475 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 31 01:31:21.744530 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 31 01:31:21.744606 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:31:21.744902 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 31 01:31:21.744956 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 31 01:31:21.745007 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:31:21.745058 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 31 01:31:21.745107 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 31 01:31:21.745166 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:31:21.745216 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 31 01:31:21.745264 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 31 01:31:21.745319 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:31:21.745372 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 31 01:31:21.745420 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 31 01:31:21.745467 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 31 01:31:21.745528 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:31:21.745581 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 31 01:31:21.745629 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 31 01:31:21.745675 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 31 01:31:21.745722 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:31:21.745771 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 31 01:31:21.745820 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 31 01:31:21.745867 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 31 01:31:21.745916 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:31:21.745964 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 31 01:31:21.746011 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 31 01:31:21.746058 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:31:21.746106 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 31 01:31:21.746153 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 31 01:31:21.746217 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:31:21.746267 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 31 01:31:21.746441 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 31 01:31:21.746495 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:31:21.746544 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 31 01:31:21.746592 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 31 01:31:21.746638 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:31:21.746687 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 31 01:31:21.746734 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 31 01:31:21.746781 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:31:21.746828 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 31 01:31:21.746879 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 31 01:31:21.746925 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 31 01:31:21.746973 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:31:21.747021 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 31 01:31:21.747068 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 31 01:31:21.747115 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 31 01:31:21.747512 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:31:21.747568 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 31 01:31:21.747619 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 31 01:31:21.747670 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:31:21.747719 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 31 01:31:21.747767 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 31 01:31:21.747814 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:31:21.747863 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 31 01:31:21.747911 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 31 01:31:21.747958 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:31:21.748006 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 31 01:31:21.748053 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 31 01:31:21.748100 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:31:21.748150 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 31 01:31:21.748197 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 31 01:31:21.748255 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:31:21.748361 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 31 01:31:21.748412 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 31 01:31:21.748611 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:31:21.748663 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:31:21.748705 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:31:21.748748 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:31:21.749092 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:31:21.749136 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:31:21.749183 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 31 01:31:21.749228 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 31 01:31:21.749272 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 31 01:31:21.749322 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 31 01:31:21.749367 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 31 01:31:21.749413 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 31 01:31:21.749456 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Oct 31 01:31:21.749505 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Oct 31 01:31:21.749562 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 31 01:31:21.749607 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 31 01:31:21.749651 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 31 01:31:21.749699 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 31 01:31:21.749746 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 31 01:31:21.749790 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 31 01:31:21.749838 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 31 01:31:21.749882 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 31 01:31:21.749938 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 31 01:31:21.749987 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 31 01:31:21.750032 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 31 01:31:21.750085 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 31 01:31:21.750129 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 31 01:31:21.750189 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 31 01:31:21.750258 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 31 01:31:21.750337 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 31 01:31:21.750410 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 31 01:31:21.750549 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 31 01:31:21.750629 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 31 01:31:21.750705 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 31 01:31:21.751982 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 31 01:31:21.752046 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 31 01:31:21.752100 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 31 01:31:21.752151 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 31 01:31:21.752206 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 31 01:31:21.752255 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 31 01:31:21.752300 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 31 01:31:21.752407 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 31 01:31:21.752457 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 31 01:31:21.752502 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 31 01:31:21.752559 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 31 01:31:21.752604 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 31 01:31:21.752654 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 31 01:31:21.752699 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 31 01:31:21.752751 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 31 01:31:21.752797 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 31 01:31:21.752850 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 31 01:31:21.752907 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 31 01:31:21.752958 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 31 01:31:21.753004 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 31 01:31:21.753048 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 31 01:31:21.753835 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 31 01:31:21.757817 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 31 01:31:21.757885 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 31 01:31:21.758136 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 31 01:31:21.758190 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 31 01:31:21.758237 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 31 01:31:21.758287 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 31 01:31:21.758413 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 31 01:31:21.759124 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 31 01:31:21.759208 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 31 01:31:21.759265 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 31 01:31:21.759326 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 31 01:31:21.759380 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 31 01:31:21.759426 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 31 01:31:21.759478 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 31 01:31:21.759523 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 31 01:31:21.759575 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 31 01:31:21.759620 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 31 01:31:21.759664 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 31 01:31:21.759712 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 31 01:31:21.759758 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 31 01:31:21.759805 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 31 01:31:21.759854 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 31 01:31:21.759900 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 31 01:31:21.759961 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 31 01:31:21.760007 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 31 01:31:21.760058 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 31 01:31:21.760105 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 31 01:31:21.760154 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 31 01:31:21.760200 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 31 01:31:21.760252 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 31 01:31:21.760296 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 31 01:31:21.760355 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 31 01:31:21.760402 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 31 01:31:21.760458 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 31 01:31:21.760469 kernel: PCI: CLS 32 bytes, default 64 Oct 31 01:31:21.760475 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 01:31:21.760483 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 31 01:31:21.760489 kernel: clocksource: Switched to clocksource tsc Oct 31 01:31:21.760495 kernel: Initialise system trusted keyrings Oct 31 01:31:21.760504 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 01:31:21.760510 kernel: Key type asymmetric registered Oct 31 01:31:21.760516 kernel: Asymmetric key parser 'x509' registered Oct 31 01:31:21.760522 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:31:21.760528 kernel: io scheduler mq-deadline registered Oct 31 01:31:21.760534 kernel: io scheduler kyber registered Oct 31 01:31:21.760540 kernel: io scheduler bfq registered Oct 31 01:31:21.760593 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 31 01:31:21.760645 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.760698 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 31 01:31:21.760750 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.760801 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 31 01:31:21.760850 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.760901 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 31 01:31:21.760951 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761000 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 31 01:31:21.761052 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761101 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 31 01:31:21.761150 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761199 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 31 01:31:21.761248 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761299 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 31 01:31:21.761355 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761406 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 31 01:31:21.761454 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761509 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 31 01:31:21.761559 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761610 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 31 01:31:21.761659 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761708 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 31 01:31:21.761757 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761809 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 31 01:31:21.761859 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.761911 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 31 01:31:21.761960 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762009 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 31 01:31:21.762057 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762106 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 31 01:31:21.762157 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762209 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 31 01:31:21.762285 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762368 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 31 01:31:21.762418 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762467 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 31 01:31:21.762717 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762781 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 31 01:31:21.762836 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.762888 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 31 01:31:21.762959 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.763277 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 31 01:31:21.763358 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.763551 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 31 01:31:21.763608 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.763661 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 31 01:31:21.764013 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.764098 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 31 01:31:21.764156 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.764209 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 31 01:31:21.764492 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.764549 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 31 01:31:21.764908 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.764970 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 31 01:31:21.765025 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.765441 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 31 01:31:21.765514 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.765571 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 31 01:31:21.765621 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.765673 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 31 01:31:21.766258 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.766343 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 31 01:31:21.766399 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 31 01:31:21.766411 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:31:21.766418 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:31:21.766424 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:31:21.766432 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 31 01:31:21.766439 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:31:21.766445 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:31:21.766499 kernel: rtc_cmos 00:01: registered as rtc0 Oct 31 01:31:21.766754 kernel: rtc_cmos 00:01: setting system clock to 2025-10-31T01:31:21 UTC (1761874281) Oct 31 01:31:21.766800 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 31 01:31:21.766809 kernel: intel_pstate: CPU model not supported Oct 31 01:31:21.766816 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:31:21.766825 kernel: Segment Routing with IPv6 Oct 31 01:31:21.766831 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:31:21.766837 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:31:21.766843 kernel: Key type dns_resolver registered Oct 31 01:31:21.766850 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:31:21.766856 kernel: IPI shorthand broadcast: enabled Oct 31 01:31:21.766862 kernel: sched_clock: Marking stable (868425932, 222584823)->(1157212852, -66202097) Oct 31 01:31:21.766868 kernel: registered taskstats version 1 Oct 31 01:31:21.766874 kernel: Loading compiled-in X.509 certificates Oct 31 01:31:21.766882 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:31:21.766888 kernel: Key type .fscrypt registered Oct 31 01:31:21.766894 kernel: Key type fscrypt-provisioning registered Oct 31 01:31:21.766905 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:31:21.766914 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:31:21.766920 kernel: ima: No architecture policies found Oct 31 01:31:21.766926 kernel: clk: Disabling unused clocks Oct 31 01:31:21.766933 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:31:21.766940 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:31:21.766948 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:31:21.766954 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:31:21.766960 kernel: Run /init as init process Oct 31 01:31:21.766966 kernel: with arguments: Oct 31 01:31:21.766972 kernel: /init Oct 31 01:31:21.766978 kernel: with environment: Oct 31 01:31:21.766984 kernel: HOME=/ Oct 31 01:31:21.766990 kernel: TERM=linux Oct 31 01:31:21.766996 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:31:21.767005 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:31:21.767014 systemd[1]: Detected virtualization vmware. Oct 31 01:31:21.767021 systemd[1]: Detected architecture x86-64. Oct 31 01:31:21.767027 systemd[1]: Running in initrd. Oct 31 01:31:21.767034 systemd[1]: No hostname configured, using default hostname. Oct 31 01:31:21.767040 systemd[1]: Hostname set to . Oct 31 01:31:21.767046 systemd[1]: Initializing machine ID from random generator. Oct 31 01:31:21.767054 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:31:21.767060 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:31:21.767066 systemd[1]: Reached target cryptsetup.target. Oct 31 01:31:21.767073 systemd[1]: Reached target paths.target. Oct 31 01:31:21.767079 systemd[1]: Reached target slices.target. Oct 31 01:31:21.767085 systemd[1]: Reached target swap.target. Oct 31 01:31:21.767091 systemd[1]: Reached target timers.target. Oct 31 01:31:21.767098 systemd[1]: Listening on iscsid.socket. Oct 31 01:31:21.767105 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:31:21.767112 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:31:21.767118 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:31:21.767124 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:31:21.767131 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:31:21.767137 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:31:21.767143 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:31:21.767150 systemd[1]: Reached target sockets.target. Oct 31 01:31:21.767156 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:31:21.767164 systemd[1]: Finished network-cleanup.service. Oct 31 01:31:21.767170 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:31:21.767177 systemd[1]: Starting systemd-journald.service... Oct 31 01:31:21.767183 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:31:21.767190 systemd[1]: Starting systemd-resolved.service... Oct 31 01:31:21.767196 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:31:21.767203 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:31:21.767209 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:31:21.767216 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:31:21.767223 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:31:21.767230 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:31:21.767236 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:31:21.767242 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:31:21.767248 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:31:21.767255 kernel: audit: type=1130 audit(1761874281.698:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.767261 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:31:21.767268 kernel: Bridge firewalling registered Oct 31 01:31:21.767275 systemd[1]: Started systemd-resolved.service. Oct 31 01:31:21.767282 systemd[1]: Reached target nss-lookup.target. Oct 31 01:31:21.767289 kernel: audit: type=1130 audit(1761874281.716:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.767295 kernel: SCSI subsystem initialized Oct 31 01:31:21.767302 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:31:21.767317 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:31:21.767585 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:31:21.767593 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:31:21.767600 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:31:21.767607 kernel: audit: type=1130 audit(1761874281.751:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.767614 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:31:21.767620 kernel: audit: type=1130 audit(1761874281.758:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.767631 systemd-journald[217]: Journal started Oct 31 01:31:21.767669 systemd-journald[217]: Runtime Journal (/run/log/journal/7019924b511c4130a0a51c2feabfd5ee) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:31:21.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.678020 systemd-modules-load[218]: Inserted module 'overlay' Oct 31 01:31:21.707711 systemd-resolved[219]: Positive Trust Anchors: Oct 31 01:31:21.771336 systemd[1]: Started systemd-journald.service. Oct 31 01:31:21.771359 kernel: audit: type=1130 audit(1761874281.767:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.707717 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:31:21.707738 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:31:21.713531 systemd-modules-load[218]: Inserted module 'br_netfilter' Oct 31 01:31:21.715231 systemd-resolved[219]: Defaulting to hostname 'linux'. Oct 31 01:31:21.751375 systemd-modules-load[218]: Inserted module 'dm_multipath' Oct 31 01:31:21.772595 dracut-cmdline[234]: dracut-dracut-053 Oct 31 01:31:21.772595 dracut-cmdline[234]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 31 01:31:21.772595 dracut-cmdline[234]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:31:21.779335 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:31:21.792327 kernel: iscsi: registered transport (tcp) Oct 31 01:31:21.809546 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:31:21.809597 kernel: QLogic iSCSI HBA Driver Oct 31 01:31:21.827178 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:31:21.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.830326 kernel: audit: type=1130 audit(1761874281.825:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:21.827834 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:31:21.866331 kernel: raid6: avx2x4 gen() 37278 MB/s Oct 31 01:31:21.883326 kernel: raid6: avx2x4 xor() 15572 MB/s Oct 31 01:31:21.900329 kernel: raid6: avx2x2 gen() 48528 MB/s Oct 31 01:31:21.917331 kernel: raid6: avx2x2 xor() 31578 MB/s Oct 31 01:31:21.934326 kernel: raid6: avx2x1 gen() 39067 MB/s Oct 31 01:31:21.951327 kernel: raid6: avx2x1 xor() 27327 MB/s Oct 31 01:31:21.968329 kernel: raid6: sse2x4 gen() 20923 MB/s Oct 31 01:31:21.985329 kernel: raid6: sse2x4 xor() 11619 MB/s Oct 31 01:31:22.002322 kernel: raid6: sse2x2 gen() 21483 MB/s Oct 31 01:31:22.019329 kernel: raid6: sse2x2 xor() 13316 MB/s Oct 31 01:31:22.036323 kernel: raid6: sse2x1 gen() 18210 MB/s Oct 31 01:31:22.053491 kernel: raid6: sse2x1 xor() 8822 MB/s Oct 31 01:31:22.053510 kernel: raid6: using algorithm avx2x2 gen() 48528 MB/s Oct 31 01:31:22.053519 kernel: raid6: .... xor() 31578 MB/s, rmw enabled Oct 31 01:31:22.054672 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:31:22.063323 kernel: xor: automatically using best checksumming function avx Oct 31 01:31:22.124327 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:31:22.130074 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:31:22.130901 systemd[1]: Starting systemd-udevd.service... Oct 31 01:31:22.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:22.138324 kernel: audit: type=1130 audit(1761874282.128:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:22.138353 kernel: audit: type=1334 audit(1761874282.129:9): prog-id=7 op=LOAD Oct 31 01:31:22.138366 kernel: audit: type=1334 audit(1761874282.129:10): prog-id=8 op=LOAD Oct 31 01:31:22.129000 audit: BPF prog-id=7 op=LOAD Oct 31 01:31:22.129000 audit: BPF prog-id=8 op=LOAD Oct 31 01:31:22.143427 systemd-udevd[416]: Using default interface naming scheme 'v252'. Oct 31 01:31:22.146181 systemd[1]: Started systemd-udevd.service. Oct 31 01:31:22.146909 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:31:22.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:22.157785 dracut-pre-trigger[423]: rd.md=0: removing MD RAID activation Oct 31 01:31:22.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:22.175142 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:31:22.175714 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:31:22.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:22.239611 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:31:22.303323 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 31 01:31:22.305246 kernel: vmw_pvscsi: using 64bit dma Oct 31 01:31:22.305272 kernel: vmw_pvscsi: max_id: 16 Oct 31 01:31:22.305281 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 31 01:31:22.311494 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 31 01:31:22.311529 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 31 01:31:22.311538 kernel: vmw_pvscsi: using MSI-X Oct 31 01:31:22.317321 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 31 01:31:22.318319 kernel: libata version 3.00 loaded. Oct 31 01:31:22.321226 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 31 01:31:22.323797 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 31 01:31:22.323821 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 31 01:31:22.332093 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 31 01:31:22.332166 kernel: scsi host1: ata_piix Oct 31 01:31:22.332230 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 31 01:31:22.335947 kernel: scsi host2: ata_piix Oct 31 01:31:22.336018 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 31 01:31:22.336027 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 31 01:31:22.336038 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 31 01:31:22.341597 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:31:22.347319 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 31 01:31:22.500334 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 31 01:31:22.504327 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 31 01:31:22.511632 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:31:22.511656 kernel: AES CTR mode by8 optimization enabled Oct 31 01:31:22.521815 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 31 01:31:22.585249 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 31 01:31:22.585341 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 31 01:31:22.585402 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 31 01:31:22.585461 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 31 01:31:22.585532 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 31 01:31:22.585599 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:31:22.585608 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:31:22.585668 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:31:22.585676 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 31 01:31:22.873490 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:31:22.879323 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (468) Oct 31 01:31:22.884632 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:31:22.901334 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:31:22.917189 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:31:22.917444 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:31:22.918373 systemd[1]: Starting disk-uuid.service... Oct 31 01:31:22.964340 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:31:22.968324 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:31:22.974346 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:31:23.972670 disk-uuid[551]: The operation has completed successfully. Oct 31 01:31:23.974339 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 31 01:31:24.018896 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:31:24.019286 systemd[1]: Finished disk-uuid.service. Oct 31 01:31:24.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.020393 systemd[1]: Starting verity-setup.service... Oct 31 01:31:24.035327 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Oct 31 01:31:24.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.085239 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:31:24.085827 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:31:24.086057 systemd[1]: Finished verity-setup.service. Oct 31 01:31:24.142073 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:31:24.142376 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:31:24.143108 systemd[1]: Starting afterburn-network-kargs.service... Oct 31 01:31:24.143961 systemd[1]: Starting ignition-setup.service... Oct 31 01:31:24.163268 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:31:24.163316 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:31:24.163329 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:31:24.175334 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:31:24.183876 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:31:24.192707 systemd[1]: Finished ignition-setup.service. Oct 31 01:31:24.193402 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:31:24.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.265107 systemd[1]: Finished afterburn-network-kargs.service. Oct 31 01:31:24.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.266097 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:31:24.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.318000 audit: BPF prog-id=9 op=LOAD Oct 31 01:31:24.318892 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:31:24.319876 systemd[1]: Starting systemd-networkd.service... Oct 31 01:31:24.334034 systemd-networkd[734]: lo: Link UP Oct 31 01:31:24.334042 systemd-networkd[734]: lo: Gained carrier Oct 31 01:31:24.334405 systemd-networkd[734]: Enumeration completed Oct 31 01:31:24.334622 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 31 01:31:24.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.335754 systemd[1]: Started systemd-networkd.service. Oct 31 01:31:24.335943 systemd[1]: Reached target network.target. Oct 31 01:31:24.337473 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:31:24.337570 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:31:24.337750 systemd[1]: Starting iscsiuio.service... Oct 31 01:31:24.339412 systemd-networkd[734]: ens192: Link UP Oct 31 01:31:24.339415 systemd-networkd[734]: ens192: Gained carrier Oct 31 01:31:24.342808 systemd[1]: Started iscsiuio.service. Oct 31 01:31:24.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.343483 systemd[1]: Starting iscsid.service... Oct 31 01:31:24.345674 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:31:24.345674 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:31:24.345674 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:31:24.345674 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:31:24.345674 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:31:24.345674 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:31:24.346657 systemd[1]: Started iscsid.service. Oct 31 01:31:24.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.348911 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:31:24.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.358081 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:31:24.358277 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:31:24.358376 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:31:24.358464 systemd[1]: Reached target remote-fs.target. Oct 31 01:31:24.359031 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:31:24.365367 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:31:24.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.386342 ignition[605]: Ignition 2.14.0 Oct 31 01:31:24.386355 ignition[605]: Stage: fetch-offline Oct 31 01:31:24.386404 ignition[605]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:24.386421 ignition[605]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:24.389751 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:24.389823 ignition[605]: parsed url from cmdline: "" Oct 31 01:31:24.389825 ignition[605]: no config URL provided Oct 31 01:31:24.389827 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:31:24.389832 ignition[605]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:31:24.390199 ignition[605]: config successfully fetched Oct 31 01:31:24.390216 ignition[605]: parsing config with SHA512: 41f6e1ccdb3588af6a4a1629b976e2c472054d73e81f644faaa86b3052bb623979ec4dbcd61c1c09335f126c642964bb70cf2be3527e583864e64a5c25588fe4 Oct 31 01:31:24.402953 unknown[605]: fetched base config from "system" Oct 31 01:31:24.402963 unknown[605]: fetched user config from "vmware" Oct 31 01:31:24.403318 systemd-resolved[219]: Detected conflict on linux IN A 139.178.70.108 Oct 31 01:31:24.403325 systemd-resolved[219]: Hostname conflict, changing published hostname from 'linux' to 'linux8'. Oct 31 01:31:24.404276 ignition[605]: fetch-offline: fetch-offline passed Oct 31 01:31:24.404358 ignition[605]: Ignition finished successfully Oct 31 01:31:24.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.405494 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:31:24.405709 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:31:24.406388 systemd[1]: Starting ignition-kargs.service... Oct 31 01:31:24.413393 ignition[753]: Ignition 2.14.0 Oct 31 01:31:24.413401 ignition[753]: Stage: kargs Oct 31 01:31:24.413502 ignition[753]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:24.413527 ignition[753]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:24.415169 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:24.417266 ignition[753]: kargs: kargs passed Oct 31 01:31:24.417332 ignition[753]: Ignition finished successfully Oct 31 01:31:24.418573 systemd[1]: Finished ignition-kargs.service. Oct 31 01:31:24.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.419532 systemd[1]: Starting ignition-disks.service... Oct 31 01:31:24.425512 ignition[759]: Ignition 2.14.0 Oct 31 01:31:24.425835 ignition[759]: Stage: disks Oct 31 01:31:24.426064 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:24.426224 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:24.427837 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:24.429341 ignition[759]: disks: disks passed Oct 31 01:31:24.429635 ignition[759]: Ignition finished successfully Oct 31 01:31:24.430343 systemd[1]: Finished ignition-disks.service. Oct 31 01:31:24.430551 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:31:24.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.430680 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:31:24.430846 systemd[1]: Reached target local-fs.target. Oct 31 01:31:24.431032 systemd[1]: Reached target sysinit.target. Oct 31 01:31:24.431232 systemd[1]: Reached target basic.target. Oct 31 01:31:24.432371 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:31:24.447000 systemd-fsck[767]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 01:31:24.448684 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:31:24.449456 systemd[1]: Mounting sysroot.mount... Oct 31 01:31:24.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.460336 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:31:24.460579 systemd[1]: Mounted sysroot.mount. Oct 31 01:31:24.460768 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:31:24.461909 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:31:24.462451 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:31:24.462505 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:31:24.462530 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:31:24.464870 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:31:24.465607 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:31:24.469121 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:31:24.473697 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:31:24.476168 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:31:24.478846 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:31:24.517048 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:31:24.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.517839 systemd[1]: Starting ignition-mount.service... Oct 31 01:31:24.518486 systemd[1]: Starting sysroot-boot.service... Oct 31 01:31:24.524550 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 01:31:24.532474 ignition[819]: INFO : Ignition 2.14.0 Oct 31 01:31:24.532474 ignition[819]: INFO : Stage: mount Oct 31 01:31:24.532890 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:24.532890 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:24.534433 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:24.536146 ignition[819]: INFO : mount: mount passed Oct 31 01:31:24.536337 ignition[819]: INFO : Ignition finished successfully Oct 31 01:31:24.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.536978 systemd[1]: Finished ignition-mount.service. Oct 31 01:31:24.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:24.543902 systemd[1]: Finished sysroot-boot.service. Oct 31 01:31:25.101350 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:31:25.110138 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (830) Oct 31 01:31:25.110168 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:31:25.110176 kernel: BTRFS info (device sda6): using free space tree Oct 31 01:31:25.110809 kernel: BTRFS info (device sda6): has skinny extents Oct 31 01:31:25.115322 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 31 01:31:25.117293 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:31:25.117884 systemd[1]: Starting ignition-files.service... Oct 31 01:31:25.127000 ignition[850]: INFO : Ignition 2.14.0 Oct 31 01:31:25.127000 ignition[850]: INFO : Stage: files Oct 31 01:31:25.127359 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:25.127359 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:25.128388 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:25.130728 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:31:25.131150 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:31:25.131150 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:31:25.133044 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:31:25.133277 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:31:25.134093 unknown[850]: wrote ssh authorized keys file for user: core Oct 31 01:31:25.134550 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:31:25.134697 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 01:31:25.134697 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Oct 31 01:31:25.174916 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 31 01:31:25.257781 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 01:31:25.258083 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:31:25.263174 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:31:25.263500 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 31 01:31:25.263863 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 31 01:31:25.264099 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 01:31:25.264440 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 01:31:25.264674 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 01:31:25.264976 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 01:31:25.265408 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:31:25.265691 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:31:25.265917 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:31:25.266234 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:31:25.266729 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:31:25.266998 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Oct 31 01:31:25.270057 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1745557011" Oct 31 01:31:25.270270 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1745557011": device or resource busy Oct 31 01:31:25.270487 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1745557011", trying btrfs: device or resource busy Oct 31 01:31:25.270702 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1745557011" Oct 31 01:31:25.270948 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1745557011" Oct 31 01:31:25.271565 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1745557011" Oct 31 01:31:25.271769 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1745557011" Oct 31 01:31:25.271958 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 31 01:31:25.272884 systemd[1]: mnt-oem1745557011.mount: Deactivated successfully. Oct 31 01:31:25.273416 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:31:25.273674 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Oct 31 01:31:25.632509 systemd-networkd[734]: ens192: Gained IPv6LL Oct 31 01:31:25.767528 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Oct 31 01:31:26.536065 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 01:31:26.539772 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:31:26.540053 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 31 01:31:26.540250 ignition[850]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Oct 31 01:31:26.540396 ignition[850]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Oct 31 01:31:26.540541 ignition[850]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Oct 31 01:31:26.540704 ignition[850]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 01:31:26.541088 ignition[850]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 01:31:26.541274 ignition[850]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Oct 31 01:31:26.541426 ignition[850]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Oct 31 01:31:26.541585 ignition[850]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:31:26.541823 ignition[850]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:31:26.542014 ignition[850]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Oct 31 01:31:26.542162 ignition[850]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" Oct 31 01:31:26.542373 ignition[850]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" Oct 31 01:31:26.542526 ignition[850]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Oct 31 01:31:26.542696 ignition[850]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Oct 31 01:31:26.542847 ignition[850]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:31:26.543002 ignition[850]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:31:26.651339 ignition[850]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:31:26.651687 ignition[850]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:31:26.652084 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:31:26.652367 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:31:26.652561 ignition[850]: INFO : files: files passed Oct 31 01:31:26.652702 ignition[850]: INFO : Ignition finished successfully Oct 31 01:31:26.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.654176 systemd[1]: Finished ignition-files.service. Oct 31 01:31:26.658706 kernel: kauditd_printk_skb: 22 callbacks suppressed Oct 31 01:31:26.658726 kernel: audit: type=1130 audit(1761874286.652:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.654808 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:31:26.654930 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:31:26.655391 systemd[1]: Starting ignition-quench.service... Oct 31 01:31:26.662788 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:31:26.662850 systemd[1]: Finished ignition-quench.service. Oct 31 01:31:26.663320 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:31:26.668400 kernel: audit: type=1130 audit(1761874286.662:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.668419 kernel: audit: type=1131 audit(1761874286.662:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.666151 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:31:26.671216 kernel: audit: type=1130 audit(1761874286.667:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.668539 systemd[1]: Reached target ignition-complete.target. Oct 31 01:31:26.671861 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:31:26.680801 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:31:26.681037 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:31:26.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.683389 systemd[1]: Reached target initrd-fs.target. Oct 31 01:31:26.686188 kernel: audit: type=1130 audit(1761874286.679:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.686205 kernel: audit: type=1131 audit(1761874286.682:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.686101 systemd[1]: Reached target initrd.target. Oct 31 01:31:26.686268 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:31:26.686758 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:31:26.693275 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:31:26.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.697325 kernel: audit: type=1130 audit(1761874286.692:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.696392 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:31:26.702084 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:31:26.702483 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:31:26.702776 systemd[1]: Stopped target timers.target. Oct 31 01:31:26.703038 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:31:26.703250 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:31:26.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.705395 systemd[1]: Stopped target initrd.target. Oct 31 01:31:26.706002 systemd[1]: Stopped target basic.target. Oct 31 01:31:26.706149 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:31:26.706393 kernel: audit: type=1131 audit(1761874286.702:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.706331 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:31:26.706504 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:31:26.706691 systemd[1]: Stopped target remote-fs.target. Oct 31 01:31:26.706859 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:31:26.707092 systemd[1]: Stopped target sysinit.target. Oct 31 01:31:26.707261 systemd[1]: Stopped target local-fs.target. Oct 31 01:31:26.707435 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:31:26.707607 systemd[1]: Stopped target swap.target. Oct 31 01:31:26.707758 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:31:26.707818 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:31:26.708087 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:31:26.710598 kernel: audit: type=1131 audit(1761874286.706:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.710559 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:31:26.710636 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:31:26.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.710907 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:31:26.713430 kernel: audit: type=1131 audit(1761874286.709:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.710983 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:31:26.713443 systemd[1]: Stopped target paths.target. Oct 31 01:31:26.713561 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:31:26.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.715338 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:31:26.715529 systemd[1]: Stopped target slices.target. Oct 31 01:31:26.715692 systemd[1]: Stopped target sockets.target. Oct 31 01:31:26.715852 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:31:26.715930 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:31:26.716184 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:31:26.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.716258 systemd[1]: Stopped ignition-files.service. Oct 31 01:31:26.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.716959 systemd[1]: Stopping ignition-mount.service... Oct 31 01:31:26.721462 iscsid[739]: iscsid shutting down. Oct 31 01:31:26.718874 systemd[1]: Stopping iscsid.service... Oct 31 01:31:26.721858 ignition[889]: INFO : Ignition 2.14.0 Oct 31 01:31:26.721858 ignition[889]: INFO : Stage: umount Oct 31 01:31:26.721858 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 01:31:26.721858 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 31 01:31:26.718981 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:31:26.719085 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:31:26.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.719732 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:31:26.719844 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:31:26.726186 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 31 01:31:26.719949 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:31:26.720145 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:31:26.720232 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:31:26.721758 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:31:26.721811 systemd[1]: Stopped iscsid.service. Oct 31 01:31:26.722579 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:31:26.722623 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:31:26.723184 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:31:26.723199 systemd[1]: Closed iscsid.socket. Oct 31 01:31:26.723736 systemd[1]: Stopping iscsiuio.service... Oct 31 01:31:26.727762 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:31:26.727815 systemd[1]: Stopped iscsiuio.service. Oct 31 01:31:26.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.728044 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:31:26.728060 systemd[1]: Closed iscsiuio.socket. Oct 31 01:31:26.732113 ignition[889]: INFO : umount: umount passed Oct 31 01:31:26.732272 ignition[889]: INFO : Ignition finished successfully Oct 31 01:31:26.732825 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:31:26.732877 systemd[1]: Stopped ignition-mount.service. Oct 31 01:31:26.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.733107 systemd[1]: Stopped target network.target. Oct 31 01:31:26.733218 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:31:26.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.733242 systemd[1]: Stopped ignition-disks.service. Oct 31 01:31:26.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.733407 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:31:26.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.733426 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:31:26.733933 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:31:26.733954 systemd[1]: Stopped ignition-setup.service. Oct 31 01:31:26.734380 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:31:26.734568 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:31:26.738876 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:31:26.738933 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:31:26.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.739627 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:31:26.739645 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:31:26.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.740158 systemd[1]: Stopping network-cleanup.service... Oct 31 01:31:26.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.741136 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:31:26.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.741164 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:31:26.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.741000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:31:26.741382 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 31 01:31:26.741406 systemd[1]: Stopped afterburn-network-kargs.service. Oct 31 01:31:26.741562 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:31:26.741585 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:31:26.741813 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:31:26.741832 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:31:26.742982 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:31:26.745421 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:31:26.745726 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:31:26.748136 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:31:26.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.749963 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:31:26.750231 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:31:26.750304 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:31:26.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.751021 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:31:26.751050 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:31:26.751161 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:31:26.751179 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:31:26.751272 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:31:26.751295 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:31:26.751420 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:31:26.751440 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:31:26.751538 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:31:26.751556 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:31:26.752017 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:31:26.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.754410 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:31:26.754442 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:31:26.753000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:31:26.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.754728 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:31:26.755066 systemd[1]: Stopped network-cleanup.service. Oct 31 01:31:26.755713 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:31:26.755755 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:31:26.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.854533 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:31:26.854609 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:31:26.854874 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:31:26.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.854992 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:31:26.855019 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:31:26.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:26.855623 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:31:26.862881 systemd[1]: Switching root. Oct 31 01:31:26.880007 systemd-journald[217]: Journal stopped Oct 31 01:31:29.369706 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Oct 31 01:31:29.369727 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:31:29.369736 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:31:29.369742 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:31:29.369748 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:31:29.369755 kernel: SELinux: policy capability open_perms=1 Oct 31 01:31:29.369761 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:31:29.369767 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:31:29.369773 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:31:29.369779 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:31:29.369784 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:31:29.369791 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:31:29.369799 systemd[1]: Successfully loaded SELinux policy in 46.535ms. Oct 31 01:31:29.369807 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.273ms. Oct 31 01:31:29.369815 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:31:29.369822 systemd[1]: Detected virtualization vmware. Oct 31 01:31:29.369830 systemd[1]: Detected architecture x86-64. Oct 31 01:31:29.369836 systemd[1]: Detected first boot. Oct 31 01:31:29.369843 systemd[1]: Initializing machine ID from random generator. Oct 31 01:31:29.369850 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:31:29.369856 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:31:29.369863 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:31:29.369870 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:31:29.369878 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:31:29.369886 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:31:29.369893 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:31:29.369900 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:31:29.369907 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:31:29.369914 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:31:29.369920 systemd[1]: Created slice system-getty.slice. Oct 31 01:31:29.369927 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:31:29.369935 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:31:29.369943 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:31:29.369950 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:31:29.369956 systemd[1]: Created slice user.slice. Oct 31 01:31:29.369963 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:31:29.369970 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:31:29.369977 systemd[1]: Set up automount boot.automount. Oct 31 01:31:29.369984 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:31:29.369992 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:31:29.370000 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:31:29.370008 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:31:29.370015 systemd[1]: Reached target integritysetup.target. Oct 31 01:31:29.370022 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:31:29.370029 systemd[1]: Reached target remote-fs.target. Oct 31 01:31:29.370036 systemd[1]: Reached target slices.target. Oct 31 01:31:29.370043 systemd[1]: Reached target swap.target. Oct 31 01:31:29.370050 systemd[1]: Reached target torcx.target. Oct 31 01:31:29.370058 systemd[1]: Reached target veritysetup.target. Oct 31 01:31:29.370065 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:31:29.370072 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:31:29.370079 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:31:29.370085 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:31:29.370094 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:31:29.370102 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:31:29.370109 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:31:29.370116 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:31:29.370124 systemd[1]: Mounting media.mount... Oct 31 01:31:29.370131 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:31:29.370138 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:31:29.370145 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:31:29.370154 systemd[1]: Mounting tmp.mount... Oct 31 01:31:29.370161 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:31:29.370168 systemd[1]: Starting ignition-delete-config.service... Oct 31 01:31:29.370175 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:31:29.370182 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:31:29.370189 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:31:29.370196 systemd[1]: Starting modprobe@drm.service... Oct 31 01:31:29.370204 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:31:29.370211 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:31:29.370219 systemd[1]: Starting modprobe@loop.service... Oct 31 01:31:29.370227 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:31:29.370234 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:31:29.370241 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:31:29.370249 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:31:29.370256 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:31:29.370264 systemd[1]: Stopped systemd-journald.service. Oct 31 01:31:29.370271 systemd[1]: Starting systemd-journald.service... Oct 31 01:31:29.370278 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:31:29.370286 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:31:29.370293 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:31:29.370301 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:31:29.370325 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:31:29.370335 systemd[1]: Stopped verity-setup.service. Oct 31 01:31:29.370342 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:31:29.370349 kernel: fuse: init (API version 7.34) Oct 31 01:31:29.370356 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:31:29.370363 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:31:29.370372 systemd[1]: Mounted media.mount. Oct 31 01:31:29.370379 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:31:29.370386 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:31:29.370393 systemd[1]: Mounted tmp.mount. Oct 31 01:31:29.370400 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:31:29.370408 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:31:29.370415 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:31:29.370423 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:31:29.370430 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:31:29.370439 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:31:29.370446 systemd[1]: Finished modprobe@drm.service. Oct 31 01:31:29.370454 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:31:29.370461 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:31:29.370470 systemd-journald[1012]: Journal started Oct 31 01:31:29.370505 systemd-journald[1012]: Runtime Journal (/run/log/journal/abd1d8a86a7947638d467d8ab0aad61b) is 4.8M, max 38.8M, 34.0M free. Oct 31 01:31:27.129000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:31:27.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:31:27.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:31:27.398000 audit: BPF prog-id=10 op=LOAD Oct 31 01:31:27.398000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:31:27.398000 audit: BPF prog-id=11 op=LOAD Oct 31 01:31:27.398000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:31:27.486000 audit[924]: AVC avc: denied { associate } for pid=924 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:31:27.486000 audit[924]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:31:27.486000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:31:27.487000 audit[924]: AVC avc: denied { associate } for pid=924 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:31:27.487000 audit[924]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:31:27.487000 audit: CWD cwd="/" Oct 31 01:31:27.487000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:27.487000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:27.487000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:31:29.254000 audit: BPF prog-id=12 op=LOAD Oct 31 01:31:29.254000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:31:29.254000 audit: BPF prog-id=13 op=LOAD Oct 31 01:31:29.254000 audit: BPF prog-id=14 op=LOAD Oct 31 01:31:29.254000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:31:29.254000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:31:29.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.266000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:31:29.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.331000 audit: BPF prog-id=15 op=LOAD Oct 31 01:31:29.331000 audit: BPF prog-id=16 op=LOAD Oct 31 01:31:29.331000 audit: BPF prog-id=17 op=LOAD Oct 31 01:31:29.331000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:31:29.331000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:31:29.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.366000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:31:29.366000 audit[1012]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffefa1a9e0 a2=4000 a3=7fffefa1aa7c items=0 ppid=1 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:31:29.366000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:31:29.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:27.484803 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:31:29.253591 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:31:27.485528 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:31:29.253600 systemd[1]: Unnecessary job was removed for dev-sda6.device. Oct 31 01:31:27.485540 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:31:29.256546 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:31:27.485561 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:31:27.485567 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:31:27.485587 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:31:27.485595 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:31:27.485721 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:31:27.485745 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:31:29.372116 jq[991]: true Oct 31 01:31:27.485752 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:31:27.486684 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:31:27.486704 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:31:29.372348 systemd[1]: Started systemd-journald.service. Oct 31 01:31:27.486715 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:31:27.486724 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:31:29.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:27.486733 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:31:29.372725 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:31:27.486741 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:31:29.372805 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:31:28.957228 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:31:28.957408 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:31:29.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:28.957477 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:31:29.373332 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:31:28.957581 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:31:29.373640 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:31:28.957614 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:31:29.373958 jq[1029]: true Oct 31 01:31:28.957656 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2025-10-31T01:31:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:31:29.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.375258 systemd[1]: Reached target network-pre.target. Oct 31 01:31:29.377588 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:31:29.379440 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:31:29.379558 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:31:29.383333 kernel: loop: module loaded Oct 31 01:31:29.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.387530 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:31:29.388604 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:31:29.388745 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:31:29.389651 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:31:29.390878 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:31:29.391137 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:31:29.391227 systemd[1]: Finished modprobe@loop.service. Oct 31 01:31:29.391419 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:31:29.391571 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:31:29.391755 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:31:29.392660 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:31:29.393216 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:31:29.394912 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:31:29.403082 systemd-journald[1012]: Time spent on flushing to /var/log/journal/abd1d8a86a7947638d467d8ab0aad61b is 23.394ms for 1995 entries. Oct 31 01:31:29.403082 systemd-journald[1012]: System Journal (/var/log/journal/abd1d8a86a7947638d467d8ab0aad61b) is 8.0M, max 584.8M, 576.8M free. Oct 31 01:31:29.433689 systemd-journald[1012]: Received client request to flush runtime journal. Oct 31 01:31:29.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.405015 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:31:29.405195 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:31:29.417020 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:31:29.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.436019 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:31:29.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.447064 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:31:29.497459 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:31:29.498481 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:31:29.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.504323 udevadm[1054]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 01:31:29.580965 ignition[1037]: Ignition 2.14.0 Oct 31 01:31:29.581191 ignition[1037]: deleting config from guestinfo properties Oct 31 01:31:29.584666 ignition[1037]: Successfully deleted config Oct 31 01:31:29.585335 systemd[1]: Finished ignition-delete-config.service. Oct 31 01:31:29.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.849527 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:31:29.850685 systemd[1]: Starting systemd-udevd.service... Oct 31 01:31:29.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.848000 audit: BPF prog-id=18 op=LOAD Oct 31 01:31:29.848000 audit: BPF prog-id=19 op=LOAD Oct 31 01:31:29.848000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:31:29.848000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:31:29.862924 systemd-udevd[1055]: Using default interface naming scheme 'v252'. Oct 31 01:31:29.895022 systemd[1]: Started systemd-udevd.service. Oct 31 01:31:29.896606 systemd[1]: Starting systemd-networkd.service... Oct 31 01:31:29.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.894000 audit: BPF prog-id=20 op=LOAD Oct 31 01:31:29.908570 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:31:29.906000 audit: BPF prog-id=21 op=LOAD Oct 31 01:31:29.906000 audit: BPF prog-id=22 op=LOAD Oct 31 01:31:29.906000 audit: BPF prog-id=23 op=LOAD Oct 31 01:31:29.923694 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:31:29.934917 systemd[1]: Started systemd-userdbd.service. Oct 31 01:31:29.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:29.965326 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:31:29.971333 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:31:29.998652 systemd-networkd[1064]: lo: Link UP Oct 31 01:31:29.998657 systemd-networkd[1064]: lo: Gained carrier Oct 31 01:31:30.000056 systemd-networkd[1064]: Enumeration completed Oct 31 01:31:30.000109 systemd[1]: Started systemd-networkd.service. Oct 31 01:31:29.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.000346 systemd-networkd[1064]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 31 01:31:30.003322 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 31 01:31:30.003454 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 31 01:31:30.005031 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 31 01:31:30.005366 systemd-networkd[1064]: ens192: Link UP Oct 31 01:31:30.005455 systemd-networkd[1064]: ens192: Gained carrier Oct 31 01:31:30.025533 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:31:30.047000 audit[1060]: AVC avc: denied { confidentiality } for pid=1060 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:31:30.055328 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 31 01:31:30.057191 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 31 01:31:30.057271 kernel: Guest personality initialized and is active Oct 31 01:31:30.047000 audit[1060]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594d745c2f0 a1=338ec a2=7f98c04d4bc5 a3=5 items=110 ppid=1055 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:31:30.047000 audit: CWD cwd="/" Oct 31 01:31:30.047000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=1 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=2 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=3 name=(null) inode=24707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=4 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=5 name=(null) inode=24708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=6 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=7 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=8 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=9 name=(null) inode=24710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=10 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=11 name=(null) inode=24711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=12 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=13 name=(null) inode=24712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=14 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=15 name=(null) inode=24713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=16 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=17 name=(null) inode=24714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=18 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=19 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=20 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=21 name=(null) inode=24716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=22 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=23 name=(null) inode=24717 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=24 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=25 name=(null) inode=24718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=26 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=27 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=28 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=29 name=(null) inode=24720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=30 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=31 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=32 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=33 name=(null) inode=24722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=34 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=35 name=(null) inode=24723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=36 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=37 name=(null) inode=24724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=38 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=39 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=40 name=(null) inode=24721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=41 name=(null) inode=24726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=42 name=(null) inode=24706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=43 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=44 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=45 name=(null) inode=24728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=46 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=47 name=(null) inode=24729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=48 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=49 name=(null) inode=24730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=50 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=51 name=(null) inode=24731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=52 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=53 name=(null) inode=24732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=55 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=56 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=57 name=(null) inode=24734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=58 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.058762 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 31 01:31:30.058777 kernel: Initialized host personality Oct 31 01:31:30.047000 audit: PATH item=59 name=(null) inode=24735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=60 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=61 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=62 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=63 name=(null) inode=24737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=64 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=65 name=(null) inode=24738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=66 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=67 name=(null) inode=24739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=68 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=69 name=(null) inode=24740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=70 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=71 name=(null) inode=24741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=72 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=73 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=74 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=75 name=(null) inode=24743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=76 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=77 name=(null) inode=24744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=78 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=79 name=(null) inode=24745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=80 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=81 name=(null) inode=24746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=82 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=83 name=(null) inode=24747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=84 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=85 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=86 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=87 name=(null) inode=24749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=88 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=89 name=(null) inode=24750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=90 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=91 name=(null) inode=24751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=92 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=93 name=(null) inode=24752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=94 name=(null) inode=24748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=95 name=(null) inode=24753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=96 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=97 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=98 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=99 name=(null) inode=24755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=100 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=101 name=(null) inode=24756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=102 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=103 name=(null) inode=24757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=104 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=105 name=(null) inode=24758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=106 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=107 name=(null) inode=24759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PATH item=109 name=(null) inode=24760 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:31:30.047000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:31:30.068325 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 31 01:31:30.092326 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:31:30.104322 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:31:30.107347 (udev-worker)[1059]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 31 01:31:30.121550 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:31:30.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.122494 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:31:30.258037 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:31:30.293998 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:31:30.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.294251 systemd[1]: Reached target cryptsetup.target. Oct 31 01:31:30.295395 systemd[1]: Starting lvm2-activation.service... Oct 31 01:31:30.298781 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:31:30.322009 systemd[1]: Finished lvm2-activation.service. Oct 31 01:31:30.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.322238 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:31:30.322380 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:31:30.322401 systemd[1]: Reached target local-fs.target. Oct 31 01:31:30.322523 systemd[1]: Reached target machines.target. Oct 31 01:31:30.323678 systemd[1]: Starting ldconfig.service... Oct 31 01:31:30.337302 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:31:30.337358 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:31:30.338434 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:31:30.339320 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:31:30.340427 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:31:30.341528 systemd[1]: Starting systemd-sysext.service... Oct 31 01:31:30.365029 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) Oct 31 01:31:30.365848 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:31:30.384498 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:31:30.396439 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:31:30.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.412483 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:31:30.412645 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:31:30.436334 kernel: loop0: detected capacity change from 0 to 229808 Oct 31 01:31:30.776088 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:31:30.777050 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:31:30.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.809336 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:31:30.871877 systemd-fsck[1100]: fsck.fat 4.2 (2021-01-31) Oct 31 01:31:30.871877 systemd-fsck[1100]: /dev/sda1: 790 files, 120772/258078 clusters Oct 31 01:31:30.873066 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:31:30.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.874318 systemd[1]: Mounting boot.mount... Oct 31 01:31:30.884328 kernel: loop1: detected capacity change from 0 to 229808 Oct 31 01:31:30.890052 systemd[1]: Mounted boot.mount. Oct 31 01:31:30.906428 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:31:30.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.911706 (sd-sysext)[1104]: Using extensions 'kubernetes'. Oct 31 01:31:30.912341 (sd-sysext)[1104]: Merged extensions into '/usr'. Oct 31 01:31:30.924248 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:31:30.925407 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:31:30.926256 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:31:30.928076 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:31:30.929144 systemd[1]: Starting modprobe@loop.service... Oct 31 01:31:30.929855 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:31:30.929938 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:31:30.930021 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:31:30.931699 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:31:30.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.932542 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:31:30.932625 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:31:30.932928 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:31:30.932995 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:31:30.933321 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:31:30.933498 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:31:30.933566 systemd[1]: Finished modprobe@loop.service. Oct 31 01:31:30.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.933781 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:31:30.934454 systemd[1]: Finished systemd-sysext.service. Oct 31 01:31:30.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:30.935448 systemd[1]: Starting ensure-sysext.service... Oct 31 01:31:30.936827 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:31:30.942897 systemd[1]: Reloading. Oct 31 01:31:30.954713 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:31:30.965403 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:31:30.973125 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:31:30.985388 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2025-10-31T01:31:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:31:30.985404 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2025-10-31T01:31:30Z" level=info msg="torcx already run" Oct 31 01:31:31.069822 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:31:31.069984 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:31:31.086837 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:31:31.132000 audit: BPF prog-id=24 op=LOAD Oct 31 01:31:31.132000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:31:31.133000 audit: BPF prog-id=25 op=LOAD Oct 31 01:31:31.133000 audit: BPF prog-id=26 op=LOAD Oct 31 01:31:31.133000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:31:31.133000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:31:31.133000 audit: BPF prog-id=27 op=LOAD Oct 31 01:31:31.133000 audit: BPF prog-id=28 op=LOAD Oct 31 01:31:31.133000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:31:31.133000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:31:31.134000 audit: BPF prog-id=29 op=LOAD Oct 31 01:31:31.134000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:31:31.135000 audit: BPF prog-id=30 op=LOAD Oct 31 01:31:31.135000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:31:31.135000 audit: BPF prog-id=31 op=LOAD Oct 31 01:31:31.135000 audit: BPF prog-id=32 op=LOAD Oct 31 01:31:31.135000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:31:31.135000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:31:31.138556 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:31:31.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.141514 systemd[1]: Starting audit-rules.service... Oct 31 01:31:31.142569 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:31:31.143707 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:31:31.146000 audit: BPF prog-id=33 op=LOAD Oct 31 01:31:31.148153 systemd[1]: Starting systemd-resolved.service... Oct 31 01:31:31.147000 audit: BPF prog-id=34 op=LOAD Oct 31 01:31:31.149755 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:31:31.150856 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:31:31.151433 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:31:31.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.151712 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:31:31.162295 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:31:31.163105 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:31:31.164268 systemd[1]: Starting modprobe@loop.service... Oct 31 01:31:31.164424 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:31:31.164501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:31:31.164575 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:31:31.165032 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:31:31.165120 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:31:31.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.167471 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:31:31.167808 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:31:31.167897 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:31:31.167968 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:31:31.169467 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:31:31.169557 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:31:31.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.169933 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:31:31.170008 systemd[1]: Finished modprobe@loop.service. Oct 31 01:31:31.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.174003 systemd[1]: Starting modprobe@drm.service... Oct 31 01:31:31.174884 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:31:31.174000 audit[1197]: SYSTEM_BOOT pid=1197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.176332 systemd[1]: Starting modprobe@loop.service... Oct 31 01:31:31.176506 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:31:31.176582 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:31:31.178080 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:31:31.178244 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:31:31.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.179381 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:31:31.179476 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:31:31.179791 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:31:31.180064 systemd[1]: Finished modprobe@drm.service. Oct 31 01:31:31.180402 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:31:31.180471 systemd[1]: Finished modprobe@loop.service. Oct 31 01:31:31.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.181761 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:31:31.183017 systemd[1]: Finished ensure-sysext.service. Oct 31 01:31:31.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.183777 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:31:31.183851 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:31:31.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.184092 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:31:31.184569 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:31:31.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.192378 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:31:31.195836 systemd[1]: Finished ldconfig.service. Oct 31 01:31:31.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.201966 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:31:31.203236 systemd[1]: Starting systemd-update-done.service... Oct 31 01:31:31.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.208508 systemd[1]: Finished systemd-update-done.service. Oct 31 01:31:31.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:31:31.217000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:31:31.217000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee42e24f0 a2=420 a3=0 items=0 ppid=1191 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:31:31.217000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:31:31.218837 augenrules[1221]: No rules Oct 31 01:31:31.218884 systemd[1]: Finished audit-rules.service. Oct 31 01:31:31.222430 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:31:31.222608 systemd[1]: Reached target time-set.target. Oct 31 01:31:31.233767 systemd-resolved[1194]: Positive Trust Anchors: Oct 31 01:31:31.233780 systemd-resolved[1194]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:31:31.233801 systemd-resolved[1194]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:33:09.432416 systemd-timesyncd[1196]: Contacted time server 15.204.87.223:123 (0.flatcar.pool.ntp.org). Oct 31 01:33:09.432668 systemd-timesyncd[1196]: Initial clock synchronization to Fri 2025-10-31 01:33:09.432316 UTC. Oct 31 01:33:09.438989 systemd-resolved[1194]: Defaulting to hostname 'linux'. Oct 31 01:33:09.440112 systemd[1]: Started systemd-resolved.service. Oct 31 01:33:09.440267 systemd[1]: Reached target network.target. Oct 31 01:33:09.440360 systemd[1]: Reached target nss-lookup.target. Oct 31 01:33:09.440455 systemd[1]: Reached target sysinit.target. Oct 31 01:33:09.440600 systemd[1]: Started motdgen.path. Oct 31 01:33:09.440736 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:33:09.441025 systemd[1]: Started logrotate.timer. Oct 31 01:33:09.441173 systemd[1]: Started mdadm.timer. Oct 31 01:33:09.441259 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:33:09.441353 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:33:09.441374 systemd[1]: Reached target paths.target. Oct 31 01:33:09.441457 systemd[1]: Reached target timers.target. Oct 31 01:33:09.441719 systemd[1]: Listening on dbus.socket. Oct 31 01:33:09.442679 systemd[1]: Starting docker.socket... Oct 31 01:33:09.444689 systemd[1]: Listening on sshd.socket. Oct 31 01:33:09.444863 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:09.445175 systemd[1]: Listening on docker.socket. Oct 31 01:33:09.445302 systemd[1]: Reached target sockets.target. Oct 31 01:33:09.445390 systemd[1]: Reached target basic.target. Oct 31 01:33:09.445501 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:33:09.445517 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:33:09.446349 systemd[1]: Starting containerd.service... Oct 31 01:33:09.447304 systemd[1]: Starting dbus.service... Oct 31 01:33:09.448713 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:33:09.450354 systemd[1]: Starting extend-filesystems.service... Oct 31 01:33:09.450530 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:33:09.451759 systemd[1]: Starting motdgen.service... Oct 31 01:33:09.453044 jq[1231]: false Oct 31 01:33:09.454462 systemd[1]: Starting prepare-helm.service... Oct 31 01:33:09.455627 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:33:09.456632 systemd[1]: Starting sshd-keygen.service... Oct 31 01:33:09.459529 systemd[1]: Starting systemd-logind.service... Oct 31 01:33:09.459670 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:33:09.459714 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:33:09.460266 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:33:09.461303 systemd[1]: Starting update-engine.service... Oct 31 01:33:09.465760 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:33:09.466846 systemd[1]: Starting vmtoolsd.service... Oct 31 01:33:09.468398 jq[1245]: true Oct 31 01:33:09.468147 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:33:09.468264 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:33:09.468914 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:33:09.469256 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:33:09.484232 tar[1248]: linux-amd64/LICENSE Oct 31 01:33:09.484232 tar[1248]: linux-amd64/helm Oct 31 01:33:09.493581 systemd[1]: Started vmtoolsd.service. Oct 31 01:33:09.494599 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:33:09.494722 systemd[1]: Finished motdgen.service. Oct 31 01:33:09.501384 jq[1249]: true Oct 31 01:33:09.515115 extend-filesystems[1232]: Found loop1 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda1 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda2 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda3 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found usr Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda4 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda6 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda7 Oct 31 01:33:09.515115 extend-filesystems[1232]: Found sda9 Oct 31 01:33:09.515115 extend-filesystems[1232]: Checking size of /dev/sda9 Oct 31 01:33:09.514981 dbus-daemon[1230]: [system] SELinux support is enabled Oct 31 01:33:09.515302 systemd[1]: Started dbus.service. Oct 31 01:33:09.516763 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:33:09.516785 systemd[1]: Reached target system-config.target. Oct 31 01:33:09.516915 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:33:09.516926 systemd[1]: Reached target user-config.target. Oct 31 01:33:09.531298 extend-filesystems[1232]: Old size kept for /dev/sda9 Oct 31 01:33:09.531298 extend-filesystems[1232]: Found sr0 Oct 31 01:33:09.531500 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:33:09.532157 systemd[1]: Finished extend-filesystems.service. Oct 31 01:33:09.550926 update_engine[1239]: I1031 01:33:09.549537 1239 main.cc:92] Flatcar Update Engine starting Oct 31 01:33:09.552464 update_engine[1239]: I1031 01:33:09.552403 1239 update_check_scheduler.cc:74] Next update check in 3m46s Oct 31 01:33:09.552416 systemd[1]: Started update-engine.service. Oct 31 01:33:09.553770 systemd[1]: Started locksmithd.service. Oct 31 01:33:09.561293 env[1250]: time="2025-10-31T01:33:09.561263163Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:33:09.563530 bash[1283]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:33:09.564037 kernel: NET: Registered PF_VSOCK protocol family Oct 31 01:33:09.564171 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:33:09.599227 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:09.599245 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:33:09.608557 systemd-logind[1237]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:33:09.608576 systemd-logind[1237]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:33:09.608731 systemd-logind[1237]: New seat seat0. Oct 31 01:33:09.624007 systemd[1]: Started systemd-logind.service. Oct 31 01:33:09.631670 env[1250]: time="2025-10-31T01:33:09.631610222Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:33:09.631893 env[1250]: time="2025-10-31T01:33:09.631778351Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.632872 env[1250]: time="2025-10-31T01:33:09.632804144Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:33:09.632872 env[1250]: time="2025-10-31T01:33:09.632831947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666571794Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666602230Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666614488Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666620913Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666696337Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.666866702Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.667000073Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:33:09.667048 env[1250]: time="2025-10-31T01:33:09.667015099Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:33:09.667306 env[1250]: time="2025-10-31T01:33:09.667071520Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:33:09.667306 env[1250]: time="2025-10-31T01:33:09.667083889Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669592539Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669618924Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669635808Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669681280Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669691186Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669698855Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669705484Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669713103Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669720742Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669728087Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669734786Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669741679Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669820231Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:33:09.670870 env[1250]: time="2025-10-31T01:33:09.669885265Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670100123Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670120335Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670129241Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670161233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670169788Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670176762Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670182703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670188966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670197289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670203687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670209775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670217386Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670292519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670306572Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671949 env[1250]: time="2025-10-31T01:33:09.670318795Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.671383 systemd[1]: Started containerd.service. Oct 31 01:33:09.672279 env[1250]: time="2025-10-31T01:33:09.670330200Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:33:09.672279 env[1250]: time="2025-10-31T01:33:09.670342870Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:33:09.672279 env[1250]: time="2025-10-31T01:33:09.670353563Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:33:09.672279 env[1250]: time="2025-10-31T01:33:09.670370851Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:33:09.672279 env[1250]: time="2025-10-31T01:33:09.670402108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.670562375Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.670597242Z" level=info msg="Connect containerd service" Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.670623182Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.671042075Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.671270621Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.671298653Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:33:09.672388 env[1250]: time="2025-10-31T01:33:09.671713369Z" level=info msg="containerd successfully booted in 0.110951s" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672493597Z" level=info msg="Start subscribing containerd event" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672522681Z" level=info msg="Start recovering state" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672562589Z" level=info msg="Start event monitor" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672570835Z" level=info msg="Start snapshots syncer" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672575837Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:33:09.674226 env[1250]: time="2025-10-31T01:33:09.672580370Z" level=info msg="Start streaming server" Oct 31 01:33:09.771195 systemd-networkd[1064]: ens192: Gained IPv6LL Oct 31 01:33:09.772445 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:33:09.772747 systemd[1]: Reached target network-online.target. Oct 31 01:33:09.774136 systemd[1]: Starting kubelet.service... Oct 31 01:33:09.987678 tar[1248]: linux-amd64/README.md Oct 31 01:33:09.990867 systemd[1]: Finished prepare-helm.service. Oct 31 01:33:10.006352 sshd_keygen[1257]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:33:10.028034 systemd[1]: Finished sshd-keygen.service. Oct 31 01:33:10.029200 systemd[1]: Starting issuegen.service... Oct 31 01:33:10.033002 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:33:10.033119 systemd[1]: Finished issuegen.service. Oct 31 01:33:10.034336 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:33:10.046892 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:33:10.047867 systemd[1]: Started getty@tty1.service. Oct 31 01:33:10.048749 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:33:10.048945 systemd[1]: Reached target getty.target. Oct 31 01:33:10.104247 locksmithd[1286]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:33:11.220835 systemd[1]: Started kubelet.service. Oct 31 01:33:11.221224 systemd[1]: Reached target multi-user.target. Oct 31 01:33:11.222424 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:33:11.227954 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:33:11.228113 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:33:11.228323 systemd[1]: Startup finished in 925ms (kernel) + 5.502s (initrd) + 5.973s (userspace) = 12.402s. Oct 31 01:33:11.255751 login[1357]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:33:11.256318 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 31 01:33:11.264561 systemd[1]: Created slice user-500.slice. Oct 31 01:33:11.265490 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:33:11.270034 systemd-logind[1237]: New session 1 of user core. Oct 31 01:33:11.272397 systemd-logind[1237]: New session 2 of user core. Oct 31 01:33:11.274947 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:33:11.276228 systemd[1]: Starting user@500.service... Oct 31 01:33:11.278493 (systemd)[1364]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:11.329458 systemd[1364]: Queued start job for default target default.target. Oct 31 01:33:11.330317 systemd[1364]: Reached target paths.target. Oct 31 01:33:11.330412 systemd[1364]: Reached target sockets.target. Oct 31 01:33:11.330474 systemd[1364]: Reached target timers.target. Oct 31 01:33:11.330536 systemd[1364]: Reached target basic.target. Oct 31 01:33:11.330626 systemd[1364]: Reached target default.target. Oct 31 01:33:11.330691 systemd[1364]: Startup finished in 48ms. Oct 31 01:33:11.330835 systemd[1]: Started user@500.service. Oct 31 01:33:11.331722 systemd[1]: Started session-1.scope. Oct 31 01:33:11.332334 systemd[1]: Started session-2.scope. Oct 31 01:33:11.780971 kubelet[1361]: E1031 01:33:11.780943 1361 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:33:11.782150 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:33:11.782283 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:33:21.831752 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 01:33:21.831884 systemd[1]: Stopped kubelet.service. Oct 31 01:33:21.832910 systemd[1]: Starting kubelet.service... Oct 31 01:33:22.009184 systemd[1]: Started kubelet.service. Oct 31 01:33:22.077468 kubelet[1394]: E1031 01:33:22.077442 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:33:22.079621 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:33:22.079694 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:33:32.081791 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 01:33:32.081982 systemd[1]: Stopped kubelet.service. Oct 31 01:33:32.083684 systemd[1]: Starting kubelet.service... Oct 31 01:33:32.530572 systemd[1]: Started kubelet.service. Oct 31 01:33:32.634107 kubelet[1403]: E1031 01:33:32.634079 1403 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:33:32.635500 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:33:32.635588 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:33:39.631620 systemd[1]: Created slice system-sshd.slice. Oct 31 01:33:39.632494 systemd[1]: Started sshd@0-139.178.70.108:22-147.75.109.163:41356.service. Oct 31 01:33:39.721576 sshd[1409]: Accepted publickey for core from 147.75.109.163 port 41356 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:39.722654 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:39.726161 systemd[1]: Started session-3.scope. Oct 31 01:33:39.726960 systemd-logind[1237]: New session 3 of user core. Oct 31 01:33:39.775575 systemd[1]: Started sshd@1-139.178.70.108:22-147.75.109.163:41364.service. Oct 31 01:33:39.807296 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 41364 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:39.808337 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:39.811060 systemd-logind[1237]: New session 4 of user core. Oct 31 01:33:39.811555 systemd[1]: Started session-4.scope. Oct 31 01:33:39.863273 sshd[1414]: pam_unix(sshd:session): session closed for user core Oct 31 01:33:39.864892 systemd[1]: Started sshd@2-139.178.70.108:22-147.75.109.163:41374.service. Oct 31 01:33:39.866346 systemd[1]: sshd@1-139.178.70.108:22-147.75.109.163:41364.service: Deactivated successfully. Oct 31 01:33:39.866765 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:33:39.867466 systemd-logind[1237]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:33:39.868041 systemd-logind[1237]: Removed session 4. Oct 31 01:33:39.892576 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 41374 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:39.893627 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:39.896969 systemd[1]: Started session-5.scope. Oct 31 01:33:39.897994 systemd-logind[1237]: New session 5 of user core. Oct 31 01:33:39.945802 sshd[1419]: pam_unix(sshd:session): session closed for user core Oct 31 01:33:39.948552 systemd[1]: sshd@2-139.178.70.108:22-147.75.109.163:41374.service: Deactivated successfully. Oct 31 01:33:39.948967 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:33:39.949391 systemd-logind[1237]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:33:39.950248 systemd[1]: Started sshd@3-139.178.70.108:22-147.75.109.163:41380.service. Oct 31 01:33:39.950886 systemd-logind[1237]: Removed session 5. Oct 31 01:33:39.978263 sshd[1426]: Accepted publickey for core from 147.75.109.163 port 41380 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:39.979175 sshd[1426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:39.982084 systemd-logind[1237]: New session 6 of user core. Oct 31 01:33:39.982579 systemd[1]: Started session-6.scope. Oct 31 01:33:40.032417 sshd[1426]: pam_unix(sshd:session): session closed for user core Oct 31 01:33:40.034510 systemd[1]: sshd@3-139.178.70.108:22-147.75.109.163:41380.service: Deactivated successfully. Oct 31 01:33:40.034829 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:33:40.035287 systemd-logind[1237]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:33:40.035913 systemd[1]: Started sshd@4-139.178.70.108:22-147.75.109.163:38038.service. Oct 31 01:33:40.036546 systemd-logind[1237]: Removed session 6. Oct 31 01:33:40.062804 sshd[1432]: Accepted publickey for core from 147.75.109.163 port 38038 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:40.063670 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:40.066323 systemd-logind[1237]: New session 7 of user core. Oct 31 01:33:40.066815 systemd[1]: Started session-7.scope. Oct 31 01:33:40.126715 sudo[1435]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:33:40.126876 sudo[1435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:33:40.133179 dbus-daemon[1230]: \xd0\xedKC-V: received setenforce notice (enforcing=-53442288) Oct 31 01:33:40.134240 sudo[1435]: pam_unix(sudo:session): session closed for user root Oct 31 01:33:40.136067 sshd[1432]: pam_unix(sshd:session): session closed for user core Oct 31 01:33:40.138949 systemd[1]: Started sshd@5-139.178.70.108:22-147.75.109.163:38042.service. Oct 31 01:33:40.139957 systemd[1]: sshd@4-139.178.70.108:22-147.75.109.163:38038.service: Deactivated successfully. Oct 31 01:33:40.140092 systemd-logind[1237]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:33:40.140422 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:33:40.142338 systemd-logind[1237]: Removed session 7. Oct 31 01:33:40.167977 sshd[1438]: Accepted publickey for core from 147.75.109.163 port 38042 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:40.169204 sshd[1438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:40.172879 systemd[1]: Started session-8.scope. Oct 31 01:33:40.173295 systemd-logind[1237]: New session 8 of user core. Oct 31 01:33:40.225194 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:33:40.225424 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:33:40.227922 sudo[1443]: pam_unix(sudo:session): session closed for user root Oct 31 01:33:40.233407 sudo[1442]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:33:40.233985 sudo[1442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:33:40.241881 systemd[1]: Stopping audit-rules.service... Oct 31 01:33:40.241000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:33:40.246486 kernel: kauditd_printk_skb: 280 callbacks suppressed Oct 31 01:33:40.246531 kernel: audit: type=1305 audit(1761874420.241:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:33:40.241000 audit[1446]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc66fd5860 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.248495 auditctl[1446]: No rules Oct 31 01:33:40.252337 kernel: audit: type=1300 audit(1761874420.241:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc66fd5860 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.252412 kernel: audit: type=1327 audit(1761874420.241:199): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:33:40.241000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:33:40.248828 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:33:40.248965 systemd[1]: Stopped audit-rules.service. Oct 31 01:33:40.252883 systemd[1]: Starting audit-rules.service... Oct 31 01:33:40.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.259047 kernel: audit: type=1131 audit(1761874420.247:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.267208 augenrules[1463]: No rules Oct 31 01:33:40.267759 systemd[1]: Finished audit-rules.service. Oct 31 01:33:40.268633 sudo[1442]: pam_unix(sudo:session): session closed for user root Oct 31 01:33:40.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.271191 sshd[1438]: pam_unix(sshd:session): session closed for user core Oct 31 01:33:40.273383 kernel: audit: type=1130 audit(1761874420.266:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.273989 systemd[1]: sshd@5-139.178.70.108:22-147.75.109.163:38042.service: Deactivated successfully. Oct 31 01:33:40.274401 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 01:33:40.267000 audit[1442]: USER_END pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.278193 kernel: audit: type=1106 audit(1761874420.267:202): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.277919 systemd-logind[1237]: Session 8 logged out. Waiting for processes to exit. Oct 31 01:33:40.267000 audit[1442]: CRED_DISP pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.278819 systemd[1]: Started sshd@6-139.178.70.108:22-147.75.109.163:38056.service. Oct 31 01:33:40.282035 kernel: audit: type=1104 audit(1761874420.267:203): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.268000 audit[1438]: USER_END pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.286972 systemd-logind[1237]: Removed session 8. Oct 31 01:33:40.287090 kernel: audit: type=1106 audit(1761874420.268:204): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.268000 audit[1438]: CRED_DISP pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.291033 kernel: audit: type=1104 audit(1761874420.268:205): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.291129 kernel: audit: type=1131 audit(1761874420.273:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.108:22-147.75.109.163:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.108:22-147.75.109.163:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-147.75.109.163:38056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.314000 audit[1469]: USER_ACCT pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.315266 sshd[1469]: Accepted publickey for core from 147.75.109.163 port 38056 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:33:40.314000 audit[1469]: CRED_ACQ pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.314000 audit[1469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b43ffd0 a2=3 a3=0 items=0 ppid=1 pid=1469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:33:40.316308 sshd[1469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:33:40.319040 systemd-logind[1237]: New session 9 of user core. Oct 31 01:33:40.319631 systemd[1]: Started session-9.scope. Oct 31 01:33:40.321000 audit[1469]: USER_START pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.322000 audit[1471]: CRED_ACQ pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:33:40.368570 sudo[1472]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:33:40.367000 audit[1472]: USER_ACCT pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.367000 audit[1472]: CRED_REFR pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.368710 sudo[1472]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:33:40.368000 audit[1472]: USER_START pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.387056 systemd[1]: Starting docker.service... Oct 31 01:33:40.415274 env[1482]: time="2025-10-31T01:33:40.415247272Z" level=info msg="Starting up" Oct 31 01:33:40.416373 env[1482]: time="2025-10-31T01:33:40.416354040Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 01:33:40.416373 env[1482]: time="2025-10-31T01:33:40.416370947Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 01:33:40.416429 env[1482]: time="2025-10-31T01:33:40.416386412Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 01:33:40.416429 env[1482]: time="2025-10-31T01:33:40.416396274Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 01:33:40.418415 env[1482]: time="2025-10-31T01:33:40.418370682Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 01:33:40.418479 env[1482]: time="2025-10-31T01:33:40.418469155Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 01:33:40.418534 env[1482]: time="2025-10-31T01:33:40.418523056Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 01:33:40.418585 env[1482]: time="2025-10-31T01:33:40.418567393Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 01:33:40.421810 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport836385422-merged.mount: Deactivated successfully. Oct 31 01:33:40.436784 env[1482]: time="2025-10-31T01:33:40.436749307Z" level=info msg="Loading containers: start." Oct 31 01:33:40.491000 audit[1512]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.491000 audit[1512]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff4bbb2790 a2=0 a3=7fff4bbb277c items=0 ppid=1482 pid=1512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 31 01:33:40.492000 audit[1514]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.492000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe76b5a5f0 a2=0 a3=7ffe76b5a5dc items=0 ppid=1482 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 31 01:33:40.493000 audit[1516]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.493000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff0663ba30 a2=0 a3=7fff0663ba1c items=0 ppid=1482 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.493000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 01:33:40.494000 audit[1518]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.494000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd504ad710 a2=0 a3=7ffd504ad6fc items=0 ppid=1482 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 01:33:40.500000 audit[1520]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.500000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0bf1d100 a2=0 a3=7ffc0bf1d0ec items=0 ppid=1482 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 31 01:33:40.519000 audit[1525]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.519000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7025c690 a2=0 a3=7ffc7025c67c items=0 ppid=1482 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.519000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 31 01:33:40.523000 audit[1527]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.523000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5b687520 a2=0 a3=7ffe5b68750c items=0 ppid=1482 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 31 01:33:40.524000 audit[1529]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.524000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc88360d90 a2=0 a3=7ffc88360d7c items=0 ppid=1482 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 31 01:33:40.525000 audit[1531]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.525000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe82a19c00 a2=0 a3=7ffe82a19bec items=0 ppid=1482 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.525000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:33:40.529000 audit[1535]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.529000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca4f91590 a2=0 a3=7ffca4f9157c items=0 ppid=1482 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:33:40.534000 audit[1536]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.534000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc594416b0 a2=0 a3=7ffc5944169c items=0 ppid=1482 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:33:40.543042 kernel: Initializing XFRM netlink socket Oct 31 01:33:40.567790 env[1482]: time="2025-10-31T01:33:40.567760572Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 31 01:33:40.586000 audit[1544]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.586000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffef98cd840 a2=0 a3=7ffef98cd82c items=0 ppid=1482 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.586000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 31 01:33:40.596000 audit[1547]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.596000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffc6af20d0 a2=0 a3=7fffc6af20bc items=0 ppid=1482 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 31 01:33:40.598000 audit[1550]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.598000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff8bc178b0 a2=0 a3=7fff8bc1789c items=0 ppid=1482 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 31 01:33:40.600000 audit[1552]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.600000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff55da00a0 a2=0 a3=7fff55da008c items=0 ppid=1482 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 31 01:33:40.601000 audit[1554]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.601000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd7b121830 a2=0 a3=7ffd7b12181c items=0 ppid=1482 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 31 01:33:40.602000 audit[1556]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.602000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffec78eac80 a2=0 a3=7ffec78eac6c items=0 ppid=1482 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 31 01:33:40.604000 audit[1558]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.604000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffb15f64d0 a2=0 a3=7fffb15f64bc items=0 ppid=1482 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.604000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 31 01:33:40.639000 audit[1561]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.639000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdf96ba370 a2=0 a3=7ffdf96ba35c items=0 ppid=1482 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 31 01:33:40.641000 audit[1563]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.641000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf8f9cfe0 a2=0 a3=7ffdf8f9cfcc items=0 ppid=1482 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 01:33:40.643000 audit[1565]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.643000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcdf17e490 a2=0 a3=7ffcdf17e47c items=0 ppid=1482 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 01:33:40.644000 audit[1567]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.644000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe26983a50 a2=0 a3=7ffe26983a3c items=0 ppid=1482 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 31 01:33:40.646315 systemd-networkd[1064]: docker0: Link UP Oct 31 01:33:40.690000 audit[1571]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.690000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd6557c70 a2=0 a3=7ffdd6557c5c items=0 ppid=1482 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:33:40.695000 audit[1572]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:33:40.695000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdf2727380 a2=0 a3=7ffdf272736c items=0 ppid=1482 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:33:40.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 01:33:40.697074 env[1482]: time="2025-10-31T01:33:40.697050993Z" level=info msg="Loading containers: done." Oct 31 01:33:40.704628 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck898379244-merged.mount: Deactivated successfully. Oct 31 01:33:40.749752 env[1482]: time="2025-10-31T01:33:40.749704597Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 31 01:33:40.749891 env[1482]: time="2025-10-31T01:33:40.749851676Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 31 01:33:40.749946 env[1482]: time="2025-10-31T01:33:40.749926194Z" level=info msg="Daemon has completed initialization" Oct 31 01:33:40.816557 systemd[1]: Started docker.service. Oct 31 01:33:40.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:40.820177 env[1482]: time="2025-10-31T01:33:40.820140588Z" level=info msg="API listen on /run/docker.sock" Oct 31 01:33:42.831620 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 31 01:33:42.831748 systemd[1]: Stopped kubelet.service. Oct 31 01:33:42.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:42.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:42.832918 systemd[1]: Starting kubelet.service... Oct 31 01:33:43.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:43.631971 systemd[1]: Started kubelet.service. Oct 31 01:33:43.684039 kubelet[1608]: E1031 01:33:43.683989 1608 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:33:43.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:33:43.685124 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:33:43.685199 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:33:44.900170 env[1250]: time="2025-10-31T01:33:44.900139359Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Oct 31 01:33:45.581396 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1461580999.mount: Deactivated successfully. Oct 31 01:33:46.840279 env[1250]: time="2025-10-31T01:33:46.840242874Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:46.840977 env[1250]: time="2025-10-31T01:33:46.840960706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:46.842040 env[1250]: time="2025-10-31T01:33:46.842012062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:46.843030 env[1250]: time="2025-10-31T01:33:46.843009564Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:46.843497 env[1250]: time="2025-10-31T01:33:46.843483537Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Oct 31 01:33:46.843882 env[1250]: time="2025-10-31T01:33:46.843864230Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Oct 31 01:33:48.479266 env[1250]: time="2025-10-31T01:33:48.479224784Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:48.496721 env[1250]: time="2025-10-31T01:33:48.496695916Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:48.515734 env[1250]: time="2025-10-31T01:33:48.515711253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:48.537303 env[1250]: time="2025-10-31T01:33:48.537266503Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:48.537992 env[1250]: time="2025-10-31T01:33:48.537973632Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Oct 31 01:33:48.538480 env[1250]: time="2025-10-31T01:33:48.538467666Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Oct 31 01:33:50.139270 env[1250]: time="2025-10-31T01:33:50.139223850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:50.159183 env[1250]: time="2025-10-31T01:33:50.159150304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:50.165569 env[1250]: time="2025-10-31T01:33:50.165537602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:50.178174 env[1250]: time="2025-10-31T01:33:50.178146982Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:50.178574 env[1250]: time="2025-10-31T01:33:50.178556614Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Oct 31 01:33:50.178918 env[1250]: time="2025-10-31T01:33:50.178903984Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Oct 31 01:33:52.070963 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2918351736.mount: Deactivated successfully. Oct 31 01:33:52.729821 env[1250]: time="2025-10-31T01:33:52.729773485Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:52.731070 env[1250]: time="2025-10-31T01:33:52.731054345Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:52.734619 env[1250]: time="2025-10-31T01:33:52.734590600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:52.736481 env[1250]: time="2025-10-31T01:33:52.736464257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:52.736648 env[1250]: time="2025-10-31T01:33:52.736628330Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Oct 31 01:33:52.736947 env[1250]: time="2025-10-31T01:33:52.736916875Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Oct 31 01:33:53.448676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3811495805.mount: Deactivated successfully. Oct 31 01:33:53.831801 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 31 01:33:53.840657 kernel: kauditd_printk_skb: 88 callbacks suppressed Oct 31 01:33:53.840745 kernel: audit: type=1130 audit(1761874433.831:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:53.840779 kernel: audit: type=1131 audit(1761874433.831:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:53.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:53.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:53.831958 systemd[1]: Stopped kubelet.service. Oct 31 01:33:53.833341 systemd[1]: Starting kubelet.service... Oct 31 01:33:54.246987 systemd[1]: Started kubelet.service. Oct 31 01:33:54.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:54.251037 kernel: audit: type=1130 audit(1761874434.246:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:33:54.304230 kubelet[1619]: E1031 01:33:54.304204 1619 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:33:54.305436 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:33:54.305515 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:33:54.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:33:54.309039 kernel: audit: type=1131 audit(1761874434.304:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:33:54.841736 update_engine[1239]: I1031 01:33:54.841398 1239 update_attempter.cc:509] Updating boot flags... Oct 31 01:33:55.225874 env[1250]: time="2025-10-31T01:33:55.225643270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.244890 env[1250]: time="2025-10-31T01:33:55.244849866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.262925 env[1250]: time="2025-10-31T01:33:55.262880598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.287780 env[1250]: time="2025-10-31T01:33:55.287727684Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.287944 env[1250]: time="2025-10-31T01:33:55.287924884Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Oct 31 01:33:55.288267 env[1250]: time="2025-10-31T01:33:55.288252891Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 31 01:33:55.876344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount392459394.mount: Deactivated successfully. Oct 31 01:33:55.879257 env[1250]: time="2025-10-31T01:33:55.879225967Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.879818 env[1250]: time="2025-10-31T01:33:55.879801756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.880952 env[1250]: time="2025-10-31T01:33:55.880937887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.881714 env[1250]: time="2025-10-31T01:33:55.881697057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:55.882031 env[1250]: time="2025-10-31T01:33:55.882002049Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 31 01:33:55.882440 env[1250]: time="2025-10-31T01:33:55.882426206Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Oct 31 01:33:56.296469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1440204784.mount: Deactivated successfully. Oct 31 01:33:58.809386 env[1250]: time="2025-10-31T01:33:58.809345979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:58.814829 env[1250]: time="2025-10-31T01:33:58.814798644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:58.815939 env[1250]: time="2025-10-31T01:33:58.815921176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:58.817054 env[1250]: time="2025-10-31T01:33:58.817038447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:33:58.817620 env[1250]: time="2025-10-31T01:33:58.817604747Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Oct 31 01:34:01.610787 systemd[1]: Stopped kubelet.service. Oct 31 01:34:01.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:01.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:01.613181 systemd[1]: Starting kubelet.service... Oct 31 01:34:01.617678 kernel: audit: type=1130 audit(1761874441.610:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:01.617830 kernel: audit: type=1131 audit(1761874441.610:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:01.642880 systemd[1]: Reloading. Oct 31 01:34:01.710757 /usr/lib/systemd/system-generators/torcx-generator[1684]: time="2025-10-31T01:34:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:34:01.710777 /usr/lib/systemd/system-generators/torcx-generator[1684]: time="2025-10-31T01:34:01Z" level=info msg="torcx already run" Oct 31 01:34:01.773754 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:34:01.773774 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:34:01.786766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:34:01.839664 kernel: audit: type=1400 audit(1761874441.833:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839735 kernel: audit: type=1400 audit(1761874441.833:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.844083 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:34:01.844173 kernel: audit: type=1400 audit(1761874441.833:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.844194 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:34:01.844208 kernel: audit: backlog limit exceeded Oct 31 01:34:01.844237 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.848840 kernel: audit: type=1400 audit(1761874441.833:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.835000 audit: BPF prog-id=40 op=LOAD Oct 31 01:34:01.835000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit: BPF prog-id=41 op=LOAD Oct 31 01:34:01.838000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit: BPF prog-id=42 op=LOAD Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.838000 audit: BPF prog-id=43 op=LOAD Oct 31 01:34:01.838000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:34:01.838000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit: BPF prog-id=44 op=LOAD Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.839000 audit: BPF prog-id=45 op=LOAD Oct 31 01:34:01.839000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:34:01.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.847000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:34:01.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.848000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit: BPF prog-id=49 op=LOAD Oct 31 01:34:01.850000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit: BPF prog-id=50 op=LOAD Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.850000 audit: BPF prog-id=51 op=LOAD Oct 31 01:34:01.850000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:34:01.850000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit: BPF prog-id=52 op=LOAD Oct 31 01:34:01.851000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit: BPF prog-id=53 op=LOAD Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:01.851000 audit: BPF prog-id=54 op=LOAD Oct 31 01:34:01.851000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:34:01.851000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:34:01.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 01:34:01.870129 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Oct 31 01:34:01.870210 systemd[1]: kubelet.service: Failed with result 'signal'. Oct 31 01:34:01.870404 systemd[1]: Stopped kubelet.service. Oct 31 01:34:01.872400 systemd[1]: Starting kubelet.service... Oct 31 01:34:03.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:03.273128 systemd[1]: Started kubelet.service. Oct 31 01:34:03.537006 kubelet[1748]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:34:03.537233 kubelet[1748]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:34:03.537296 kubelet[1748]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:34:03.537425 kubelet[1748]: I1031 01:34:03.537401 1748 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:34:03.821313 kubelet[1748]: I1031 01:34:03.821236 1748 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 31 01:34:03.821313 kubelet[1748]: I1031 01:34:03.821258 1748 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:34:03.821739 kubelet[1748]: I1031 01:34:03.821724 1748 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 01:34:04.261665 kubelet[1748]: I1031 01:34:04.261640 1748 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:34:04.295111 kubelet[1748]: E1031 01:34:04.295078 1748 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://139.178.70.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 01:34:04.309175 kubelet[1748]: E1031 01:34:04.309129 1748 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:34:04.309175 kubelet[1748]: I1031 01:34:04.309173 1748 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:34:04.312204 kubelet[1748]: I1031 01:34:04.312181 1748 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:34:04.312374 kubelet[1748]: I1031 01:34:04.312350 1748 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:34:04.312537 kubelet[1748]: I1031 01:34:04.312374 1748 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:34:04.312638 kubelet[1748]: I1031 01:34:04.312539 1748 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:34:04.312638 kubelet[1748]: I1031 01:34:04.312546 1748 container_manager_linux.go:303] "Creating device plugin manager" Oct 31 01:34:04.312695 kubelet[1748]: I1031 01:34:04.312641 1748 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:04.320508 kubelet[1748]: I1031 01:34:04.320465 1748 kubelet.go:480] "Attempting to sync node with API server" Oct 31 01:34:04.320508 kubelet[1748]: I1031 01:34:04.320515 1748 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:34:04.326225 kubelet[1748]: I1031 01:34:04.326180 1748 kubelet.go:386] "Adding apiserver pod source" Oct 31 01:34:04.326225 kubelet[1748]: I1031 01:34:04.326224 1748 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:34:04.330974 kubelet[1748]: E1031 01:34:04.330945 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 01:34:04.349265 kubelet[1748]: E1031 01:34:04.349194 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://139.178.70.108:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 01:34:04.349376 kubelet[1748]: I1031 01:34:04.349334 1748 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:34:04.349801 kubelet[1748]: I1031 01:34:04.349721 1748 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 01:34:04.354404 kubelet[1748]: W1031 01:34:04.354379 1748 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:34:04.357773 kubelet[1748]: I1031 01:34:04.357755 1748 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:34:04.357853 kubelet[1748]: I1031 01:34:04.357804 1748 server.go:1289] "Started kubelet" Oct 31 01:34:04.362276 kubelet[1748]: I1031 01:34:04.362242 1748 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:34:04.362950 kubelet[1748]: I1031 01:34:04.362939 1748 server.go:317] "Adding debug handlers to kubelet server" Oct 31 01:34:04.363379 kubelet[1748]: I1031 01:34:04.363314 1748 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:34:04.363558 kubelet[1748]: I1031 01:34:04.363547 1748 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:34:04.364770 kubelet[1748]: E1031 01:34:04.363618 1748 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.108:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.108:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18736f78eac8ac2a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-10-31 01:34:04.357774378 +0000 UTC m=+1.081556067,LastTimestamp:2025-10-31 01:34:04.357774378 +0000 UTC m=+1.081556067,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Oct 31 01:34:04.364000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:04.364000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:04.364000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00047bb00 a1=c0009d3f38 a2=c00047bad0 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:04.364000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:04.364000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:04.364000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3c200 a1=c0009d3f50 a2=c00047bb90 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:04.366065 kubelet[1748]: I1031 01:34:04.365608 1748 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:34:04.366065 kubelet[1748]: I1031 01:34:04.365638 1748 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:34:04.366065 kubelet[1748]: I1031 01:34:04.365683 1748 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:34:04.366626 kubelet[1748]: E1031 01:34:04.366617 1748 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:34:04.366799 kubelet[1748]: I1031 01:34:04.366790 1748 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:34:04.370006 kubelet[1748]: E1031 01:34:04.369986 1748 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:34:04.370123 kubelet[1748]: I1031 01:34:04.370116 1748 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:34:04.369000 audit[1763]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.369000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9515ef50 a2=0 a3=7ffd9515ef3c items=0 ppid=1748 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:34:04.370410 kubelet[1748]: I1031 01:34:04.370401 1748 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:34:04.370480 kubelet[1748]: I1031 01:34:04.370474 1748 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:34:04.369000 audit[1764]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.369000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe05cc0c60 a2=0 a3=7ffe05cc0c4c items=0 ppid=1748 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:34:04.371247 kubelet[1748]: E1031 01:34:04.371235 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 01:34:04.371770 kubelet[1748]: E1031 01:34:04.371752 1748 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="200ms" Oct 31 01:34:04.371885 kubelet[1748]: I1031 01:34:04.371877 1748 factory.go:223] Registration of the containerd container factory successfully Oct 31 01:34:04.371932 kubelet[1748]: I1031 01:34:04.371925 1748 factory.go:223] Registration of the systemd container factory successfully Oct 31 01:34:04.372014 kubelet[1748]: I1031 01:34:04.372004 1748 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:34:04.371000 audit[1766]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.371000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7ff23d80 a2=0 a3=7ffc7ff23d6c items=0 ppid=1748 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:04.372000 audit[1768]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.372000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb0021ff0 a2=0 a3=7ffdb0021fdc items=0 ppid=1748 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:04.392582 kubelet[1748]: I1031 01:34:04.392561 1748 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:34:04.392582 kubelet[1748]: I1031 01:34:04.392575 1748 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:34:04.392582 kubelet[1748]: I1031 01:34:04.392589 1748 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:04.393336 kubelet[1748]: I1031 01:34:04.393323 1748 policy_none.go:49] "None policy: Start" Oct 31 01:34:04.393336 kubelet[1748]: I1031 01:34:04.393335 1748 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:34:04.393410 kubelet[1748]: I1031 01:34:04.393341 1748 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:34:04.392000 audit[1775]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.392000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc74329d70 a2=0 a3=7ffc74329d5c items=0 ppid=1748 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 01:34:04.393998 kubelet[1748]: I1031 01:34:04.393986 1748 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 31 01:34:04.394000 audit[1776]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:04.394000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe34f33e0 a2=0 a3=7fffe34f33cc items=0 ppid=1748 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:34:04.396115 systemd[1]: Created slice kubepods.slice. Oct 31 01:34:04.396504 kubelet[1748]: I1031 01:34:04.395925 1748 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 31 01:34:04.396504 kubelet[1748]: I1031 01:34:04.395940 1748 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 31 01:34:04.396504 kubelet[1748]: I1031 01:34:04.395958 1748 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:34:04.396504 kubelet[1748]: I1031 01:34:04.395965 1748 kubelet.go:2436] "Starting kubelet main sync loop" Oct 31 01:34:04.396504 kubelet[1748]: E1031 01:34:04.395994 1748 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 01:34:04.395000 audit[1777]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.395000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7c8827f0 a2=0 a3=7fff7c8827dc items=0 ppid=1748 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:34:04.396000 audit[1778]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.396000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9db578a0 a2=0 a3=7ffc9db5788c items=0 ppid=1748 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:34:04.397000 audit[1779]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:04.397000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6af60070 a2=0 a3=7ffc6af6005c items=0 ppid=1748 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:34:04.399510 kubelet[1748]: E1031 01:34:04.399488 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 01:34:04.398000 audit[1781]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:04.398000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd1104c3d0 a2=0 a3=7ffd1104c3bc items=0 ppid=1748 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:34:04.399000 audit[1782]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:04.399000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4b0658f0 a2=0 a3=7ffc4b0658dc items=0 ppid=1748 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:34:04.401668 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:34:04.401000 audit[1780]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:04.401000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff23bb8540 a2=0 a3=7fff23bb852c items=0 ppid=1748 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:34:04.403758 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:34:04.409745 kubelet[1748]: E1031 01:34:04.409727 1748 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 01:34:04.408000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:04.408000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:04.408000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000886360 a1=c000b49f20 a2=c000886330 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:04.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:04.410669 kubelet[1748]: E1031 01:34:04.410645 1748 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 01:34:04.410749 kubelet[1748]: I1031 01:34:04.410737 1748 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:34:04.410793 kubelet[1748]: I1031 01:34:04.410746 1748 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:34:04.410962 kubelet[1748]: I1031 01:34:04.410949 1748 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:34:04.411628 kubelet[1748]: E1031 01:34:04.411609 1748 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:34:04.411718 kubelet[1748]: E1031 01:34:04.411708 1748 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 31 01:34:04.503392 systemd[1]: Created slice kubepods-burstable-pod84316240f22e66b5e4a0dbe919986312.slice. Oct 31 01:34:04.508983 kubelet[1748]: E1031 01:34:04.508950 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:04.510801 systemd[1]: Created slice kubepods-burstable-pod20c890a246d840d308022312da9174cb.slice. Oct 31 01:34:04.514102 kubelet[1748]: I1031 01:34:04.512545 1748 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:04.514102 kubelet[1748]: E1031 01:34:04.512838 1748 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 31 01:34:04.514102 kubelet[1748]: E1031 01:34:04.513054 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:04.527075 systemd[1]: Created slice kubepods-burstable-podd13d96f639b65e57f439b4396b605564.slice. Oct 31 01:34:04.528418 kubelet[1748]: E1031 01:34:04.528399 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:04.571916 kubelet[1748]: I1031 01:34:04.571890 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:04.572239 kubelet[1748]: I1031 01:34:04.572228 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:04.572325 kubelet[1748]: I1031 01:34:04.572316 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:04.572398 kubelet[1748]: I1031 01:34:04.572390 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:04.572488 kubelet[1748]: I1031 01:34:04.572473 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:04.572562 kubelet[1748]: I1031 01:34:04.572554 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d13d96f639b65e57f439b4396b605564-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d13d96f639b65e57f439b4396b605564\") " pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:04.572607 kubelet[1748]: E1031 01:34:04.572091 1748 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="400ms" Oct 31 01:34:04.572666 kubelet[1748]: I1031 01:34:04.572655 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:04.572729 kubelet[1748]: I1031 01:34:04.572721 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:04.572807 kubelet[1748]: I1031 01:34:04.572798 1748 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:04.714619 kubelet[1748]: I1031 01:34:04.714602 1748 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:04.714919 kubelet[1748]: E1031 01:34:04.714906 1748 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 31 01:34:04.810459 env[1250]: time="2025-10-31T01:34:04.810394377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:84316240f22e66b5e4a0dbe919986312,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:04.814250 env[1250]: time="2025-10-31T01:34:04.814221244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:20c890a246d840d308022312da9174cb,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:04.830233 env[1250]: time="2025-10-31T01:34:04.830121170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d13d96f639b65e57f439b4396b605564,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:04.973726 kubelet[1748]: E1031 01:34:04.973682 1748 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="800ms" Oct 31 01:34:05.116317 kubelet[1748]: I1031 01:34:05.116299 1748 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:05.116625 kubelet[1748]: E1031 01:34:05.116612 1748 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 31 01:34:05.355082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1553104020.mount: Deactivated successfully. Oct 31 01:34:05.358195 env[1250]: time="2025-10-31T01:34:05.358113954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.358911 env[1250]: time="2025-10-31T01:34:05.358896606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.359550 env[1250]: time="2025-10-31T01:34:05.359524849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.360128 env[1250]: time="2025-10-31T01:34:05.360100689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.360696 env[1250]: time="2025-10-31T01:34:05.360654580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.361212 env[1250]: time="2025-10-31T01:34:05.361195951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.363149 env[1250]: time="2025-10-31T01:34:05.363132900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.364214 env[1250]: time="2025-10-31T01:34:05.364201262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.366884 env[1250]: time="2025-10-31T01:34:05.366488420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.367490 env[1250]: time="2025-10-31T01:34:05.367444815Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.369572 env[1250]: time="2025-10-31T01:34:05.369548161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.372682 env[1250]: time="2025-10-31T01:34:05.372632443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:05.388521 env[1250]: time="2025-10-31T01:34:05.379887865Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:05.388521 env[1250]: time="2025-10-31T01:34:05.379913484Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:05.388521 env[1250]: time="2025-10-31T01:34:05.379920693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:05.388521 env[1250]: time="2025-10-31T01:34:05.380164170Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f003ce1b9dd3861c73c53210ad61fbeca71d3f0964b1a6aa7b1ec92aa44ad321 pid=1792 runtime=io.containerd.runc.v2 Oct 31 01:34:05.394384 env[1250]: time="2025-10-31T01:34:05.394351377Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:05.394511 env[1250]: time="2025-10-31T01:34:05.394481729Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:05.394511 env[1250]: time="2025-10-31T01:34:05.394492412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:05.394706 env[1250]: time="2025-10-31T01:34:05.394677757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42c616687d98780efc82e7a375f780e61a92f75f8bbbd097b8c556b4b891ac9e pid=1810 runtime=io.containerd.runc.v2 Oct 31 01:34:05.402077 env[1250]: time="2025-10-31T01:34:05.401868743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:05.402077 env[1250]: time="2025-10-31T01:34:05.401893446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:05.402077 env[1250]: time="2025-10-31T01:34:05.401900652Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:05.402077 env[1250]: time="2025-10-31T01:34:05.401966777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/654c73650fb79d99e04e249ca30e5febaecf572a6d804c57de7d822161f6547a pid=1833 runtime=io.containerd.runc.v2 Oct 31 01:34:05.405270 systemd[1]: Started cri-containerd-42c616687d98780efc82e7a375f780e61a92f75f8bbbd097b8c556b4b891ac9e.scope. Oct 31 01:34:05.413223 systemd[1]: Started cri-containerd-f003ce1b9dd3861c73c53210ad61fbeca71d3f0964b1a6aa7b1ec92aa44ad321.scope. Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.421000 audit: BPF prog-id=55 op=LOAD Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1810 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633631363638376439383738306566633832653761333735663738 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1810 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633631363638376439383738306566633832653761333735663738 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.424000 audit: BPF prog-id=56 op=LOAD Oct 31 01:34:05.424000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003fab70 items=0 ppid=1810 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633631363638376439383738306566633832653761333735663738 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit: BPF prog-id=57 op=LOAD Oct 31 01:34:05.425000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003fabb8 items=0 ppid=1810 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633631363638376439383738306566633832653761333735663738 Oct 31 01:34:05.425000 audit: BPF prog-id=57 op=UNLOAD Oct 31 01:34:05.425000 audit: BPF prog-id=56 op=UNLOAD Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.425000 audit: BPF prog-id=58 op=LOAD Oct 31 01:34:05.425000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003fafc8 items=0 ppid=1810 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633631363638376439383738306566633832653761333735663738 Oct 31 01:34:05.433440 systemd[1]: Started cri-containerd-654c73650fb79d99e04e249ca30e5febaecf572a6d804c57de7d822161f6547a.scope. Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.435000 audit: BPF prog-id=59 op=LOAD Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1792 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303363653162396464333836316337336335333231306164363166 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1792 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303363653162396464333836316337336335333231306164363166 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit: BPF prog-id=60 op=LOAD Oct 31 01:34:05.437000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bce0 items=0 ppid=1792 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303363653162396464333836316337336335333231306164363166 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit: BPF prog-id=61 op=LOAD Oct 31 01:34:05.437000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bd28 items=0 ppid=1792 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303363653162396464333836316337336335333231306164363166 Oct 31 01:34:05.437000 audit: BPF prog-id=61 op=UNLOAD Oct 31 01:34:05.437000 audit: BPF prog-id=60 op=UNLOAD Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.437000 audit: BPF prog-id=62 op=LOAD Oct 31 01:34:05.437000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003cc138 items=0 ppid=1792 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630303363653162396464333836316337336335333231306164363166 Oct 31 01:34:05.457246 env[1250]: time="2025-10-31T01:34:05.457195750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:84316240f22e66b5e4a0dbe919986312,Namespace:kube-system,Attempt:0,} returns sandbox id \"42c616687d98780efc82e7a375f780e61a92f75f8bbbd097b8c556b4b891ac9e\"" Oct 31 01:34:05.459889 env[1250]: time="2025-10-31T01:34:05.459862192Z" level=info msg="CreateContainer within sandbox \"42c616687d98780efc82e7a375f780e61a92f75f8bbbd097b8c556b4b891ac9e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit: BPF prog-id=63 op=LOAD Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1833 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346337333635306662373964393965303465323439636133306535 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1833 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346337333635306662373964393965303465323439636133306535 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit: BPF prog-id=64 op=LOAD Oct 31 01:34:05.465000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3bc0 items=0 ppid=1833 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346337333635306662373964393965303465323439636133306535 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit: BPF prog-id=65 op=LOAD Oct 31 01:34:05.465000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3c08 items=0 ppid=1833 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346337333635306662373964393965303465323439636133306535 Oct 31 01:34:05.465000 audit: BPF prog-id=65 op=UNLOAD Oct 31 01:34:05.465000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.465000 audit: BPF prog-id=66 op=LOAD Oct 31 01:34:05.465000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034a018 items=0 ppid=1833 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635346337333635306662373964393965303465323439636133306535 Oct 31 01:34:05.468348 env[1250]: time="2025-10-31T01:34:05.467556985Z" level=info msg="CreateContainer within sandbox \"42c616687d98780efc82e7a375f780e61a92f75f8bbbd097b8c556b4b891ac9e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f33984327ce6f5b9cfd257dab666dff9a0af4f568a4dfb64ab1b738ae77bd3bb\"" Oct 31 01:34:05.468532 env[1250]: time="2025-10-31T01:34:05.468517371Z" level=info msg="StartContainer for \"f33984327ce6f5b9cfd257dab666dff9a0af4f568a4dfb64ab1b738ae77bd3bb\"" Oct 31 01:34:05.478941 systemd[1]: Started cri-containerd-f33984327ce6f5b9cfd257dab666dff9a0af4f568a4dfb64ab1b738ae77bd3bb.scope. Oct 31 01:34:05.494164 env[1250]: time="2025-10-31T01:34:05.494139489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:20c890a246d840d308022312da9174cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"f003ce1b9dd3861c73c53210ad61fbeca71d3f0964b1a6aa7b1ec92aa44ad321\"" Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.493000 audit: BPF prog-id=67 op=LOAD Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1810 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333938343332376365366635623963666432353764616236363664 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1810 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333938343332376365366635623963666432353764616236363664 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit: BPF prog-id=68 op=LOAD Oct 31 01:34:05.494000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383dc0 items=0 ppid=1810 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333938343332376365366635623963666432353764616236363664 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit: BPF prog-id=69 op=LOAD Oct 31 01:34:05.494000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383e08 items=0 ppid=1810 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333938343332376365366635623963666432353764616236363664 Oct 31 01:34:05.494000 audit: BPF prog-id=69 op=UNLOAD Oct 31 01:34:05.494000 audit: BPF prog-id=68 op=UNLOAD Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.494000 audit: BPF prog-id=70 op=LOAD Oct 31 01:34:05.494000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003fa218 items=0 ppid=1810 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333938343332376365366635623963666432353764616236363664 Oct 31 01:34:05.499285 env[1250]: time="2025-10-31T01:34:05.499266116Z" level=info msg="CreateContainer within sandbox \"f003ce1b9dd3861c73c53210ad61fbeca71d3f0964b1a6aa7b1ec92aa44ad321\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 31 01:34:05.511629 env[1250]: time="2025-10-31T01:34:05.511599585Z" level=info msg="CreateContainer within sandbox \"f003ce1b9dd3861c73c53210ad61fbeca71d3f0964b1a6aa7b1ec92aa44ad321\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2283f53938614a72332b0418a2a0af3e2a93b2417d253688e35255556c968609\"" Oct 31 01:34:05.512047 env[1250]: time="2025-10-31T01:34:05.512032572Z" level=info msg="StartContainer for \"2283f53938614a72332b0418a2a0af3e2a93b2417d253688e35255556c968609\"" Oct 31 01:34:05.514347 env[1250]: time="2025-10-31T01:34:05.514327846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d13d96f639b65e57f439b4396b605564,Namespace:kube-system,Attempt:0,} returns sandbox id \"654c73650fb79d99e04e249ca30e5febaecf572a6d804c57de7d822161f6547a\"" Oct 31 01:34:05.516774 env[1250]: time="2025-10-31T01:34:05.516718190Z" level=info msg="CreateContainer within sandbox \"654c73650fb79d99e04e249ca30e5febaecf572a6d804c57de7d822161f6547a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 31 01:34:05.522651 env[1250]: time="2025-10-31T01:34:05.522625466Z" level=info msg="CreateContainer within sandbox \"654c73650fb79d99e04e249ca30e5febaecf572a6d804c57de7d822161f6547a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9b8dc70b4e8f72f6773627a00e2b1a020740b12ed9909e19db90bd604051e2d0\"" Oct 31 01:34:05.523013 env[1250]: time="2025-10-31T01:34:05.523000599Z" level=info msg="StartContainer for \"9b8dc70b4e8f72f6773627a00e2b1a020740b12ed9909e19db90bd604051e2d0\"" Oct 31 01:34:05.526512 systemd[1]: Started cri-containerd-2283f53938614a72332b0418a2a0af3e2a93b2417d253688e35255556c968609.scope. Oct 31 01:34:05.541509 systemd[1]: Started cri-containerd-9b8dc70b4e8f72f6773627a00e2b1a020740b12ed9909e19db90bd604051e2d0.scope. Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.544000 audit: BPF prog-id=71 op=LOAD Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232383366353339333836313461373233333262303431386132613061 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232383366353339333836313461373233333262303431386132613061 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit: BPF prog-id=72 op=LOAD Oct 31 01:34:05.545000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e6f30 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232383366353339333836313461373233333262303431386132613061 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit: BPF prog-id=73 op=LOAD Oct 31 01:34:05.545000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e6f78 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232383366353339333836313461373233333262303431386132613061 Oct 31 01:34:05.545000 audit: BPF prog-id=73 op=UNLOAD Oct 31 01:34:05.545000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.545000 audit: BPF prog-id=74 op=LOAD Oct 31 01:34:05.545000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e7388 items=0 ppid=1792 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232383366353339333836313461373233333262303431386132613061 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.552000 audit: BPF prog-id=75 op=LOAD Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1833 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962386463373062346538663732663637373336323761303065326231 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1833 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962386463373062346538663732663637373336323761303065326231 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit: BPF prog-id=76 op=LOAD Oct 31 01:34:05.553000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021e540 items=0 ppid=1833 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962386463373062346538663732663637373336323761303065326231 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit: BPF prog-id=77 op=LOAD Oct 31 01:34:05.553000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021e588 items=0 ppid=1833 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962386463373062346538663732663637373336323761303065326231 Oct 31 01:34:05.553000 audit: BPF prog-id=77 op=UNLOAD Oct 31 01:34:05.553000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:05.553000 audit: BPF prog-id=78 op=LOAD Oct 31 01:34:05.553000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021e998 items=0 ppid=1833 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:05.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962386463373062346538663732663637373336323761303065326231 Oct 31 01:34:05.557089 env[1250]: time="2025-10-31T01:34:05.557066158Z" level=info msg="StartContainer for \"f33984327ce6f5b9cfd257dab666dff9a0af4f568a4dfb64ab1b738ae77bd3bb\" returns successfully" Oct 31 01:34:05.585206 env[1250]: time="2025-10-31T01:34:05.585180059Z" level=info msg="StartContainer for \"2283f53938614a72332b0418a2a0af3e2a93b2417d253688e35255556c968609\" returns successfully" Oct 31 01:34:05.590040 env[1250]: time="2025-10-31T01:34:05.589285566Z" level=info msg="StartContainer for \"9b8dc70b4e8f72f6773627a00e2b1a020740b12ed9909e19db90bd604051e2d0\" returns successfully" Oct 31 01:34:05.699306 kubelet[1748]: E1031 01:34:05.699237 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 01:34:05.722059 kubelet[1748]: E1031 01:34:05.722034 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 01:34:05.731643 kubelet[1748]: E1031 01:34:05.731618 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://139.178.70.108:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 01:34:05.774545 kubelet[1748]: E1031 01:34:05.774517 1748 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="1.6s" Oct 31 01:34:05.912197 kubelet[1748]: E1031 01:34:05.912174 1748 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 01:34:05.918197 kubelet[1748]: I1031 01:34:05.918185 1748 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:05.918425 kubelet[1748]: E1031 01:34:05.918412 1748 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Oct 31 01:34:06.403218 kubelet[1748]: E1031 01:34:06.403202 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:06.404077 kubelet[1748]: E1031 01:34:06.404068 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:06.405012 kubelet[1748]: E1031 01:34:06.405003 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:06.459014 kubelet[1748]: E1031 01:34:06.458992 1748 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://139.178.70.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.108:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 01:34:07.004000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.009037 kernel: kauditd_printk_skb: 620 callbacks suppressed Oct 31 01:34:07.009087 kernel: audit: type=1400 audit(1761874447.004:516): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.009106 kernel: audit: type=1300 audit(1761874447.004:516): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000078810 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:07.004000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000078810 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:07.004000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:07.020696 kernel: audit: type=1327 audit(1761874447.004:516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:07.020761 kernel: audit: type=1400 audit(1761874447.004:517): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.004000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.025054 kernel: audit: type=1300 audit(1761874447.004:517): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003d88c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:07.004000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003d88c0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:07.028572 kernel: audit: type=1327 audit(1761874447.004:517): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:07.004000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:07.252000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.252000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0065aa000 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.260310 kernel: audit: type=1400 audit(1761874447.252:518): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.260383 kernel: audit: type=1300 audit(1761874447.252:518): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0065aa000 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.260409 kernel: audit: type=1327 audit(1761874447.252:518): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.253000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.266678 kernel: audit: type=1400 audit(1761874447.253:519): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.253000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0056b2640 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.253000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6762 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.253000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0065aa150 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.274000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6768 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.274000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0065aa660 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.287000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.287000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0056b3960 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.287000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:07.287000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0056c3b30 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:34:07.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:34:07.379036 kubelet[1748]: E1031 01:34:07.378998 1748 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Oct 31 01:34:07.406509 kubelet[1748]: E1031 01:34:07.406476 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:07.407179 kubelet[1748]: E1031 01:34:07.407164 1748 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Oct 31 01:34:07.519498 kubelet[1748]: I1031 01:34:07.519431 1748 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:07.529562 kubelet[1748]: I1031 01:34:07.529536 1748 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Oct 31 01:34:07.529562 kubelet[1748]: E1031 01:34:07.529562 1748 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Oct 31 01:34:07.537398 kubelet[1748]: E1031 01:34:07.537357 1748 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:34:07.637501 kubelet[1748]: E1031 01:34:07.637429 1748 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 31 01:34:07.672450 kubelet[1748]: I1031 01:34:07.672430 1748 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:07.676441 kubelet[1748]: E1031 01:34:07.676416 1748 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:07.676441 kubelet[1748]: I1031 01:34:07.676437 1748 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:07.677697 kubelet[1748]: E1031 01:34:07.677685 1748 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:07.677758 kubelet[1748]: I1031 01:34:07.677750 1748 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:07.678689 kubelet[1748]: E1031 01:34:07.678673 1748 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:08.334157 kubelet[1748]: I1031 01:34:08.334127 1748 apiserver.go:52] "Watching apiserver" Oct 31 01:34:08.371462 kubelet[1748]: I1031 01:34:08.371431 1748 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:34:09.308650 systemd[1]: Reloading. Oct 31 01:34:09.344440 kubelet[1748]: I1031 01:34:09.344424 1748 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:09.389257 /usr/lib/systemd/system-generators/torcx-generator[2049]: time="2025-10-31T01:34:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:34:09.389485 /usr/lib/systemd/system-generators/torcx-generator[2049]: time="2025-10-31T01:34:09Z" level=info msg="torcx already run" Oct 31 01:34:09.430832 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:34:09.430847 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:34:09.442692 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit: BPF prog-id=79 op=LOAD Oct 31 01:34:09.496000 audit: BPF prog-id=40 op=UNLOAD Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.496000 audit: BPF prog-id=80 op=LOAD Oct 31 01:34:09.496000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.497000 audit: BPF prog-id=81 op=LOAD Oct 31 01:34:09.497000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit: BPF prog-id=82 op=LOAD Oct 31 01:34:09.498000 audit: BPF prog-id=41 op=UNLOAD Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit: BPF prog-id=83 op=LOAD Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.499000 audit: BPF prog-id=84 op=LOAD Oct 31 01:34:09.499000 audit: BPF prog-id=42 op=UNLOAD Oct 31 01:34:09.499000 audit: BPF prog-id=43 op=UNLOAD Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.500000 audit: BPF prog-id=85 op=LOAD Oct 31 01:34:09.500000 audit: BPF prog-id=59 op=UNLOAD Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit: BPF prog-id=86 op=LOAD Oct 31 01:34:09.501000 audit: BPF prog-id=71 op=UNLOAD Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit: BPF prog-id=87 op=LOAD Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit: BPF prog-id=88 op=LOAD Oct 31 01:34:09.502000 audit: BPF prog-id=44 op=UNLOAD Oct 31 01:34:09.502000 audit: BPF prog-id=45 op=UNLOAD Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit: BPF prog-id=89 op=LOAD Oct 31 01:34:09.503000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.503000 audit: BPF prog-id=90 op=LOAD Oct 31 01:34:09.504000 audit: BPF prog-id=46 op=UNLOAD Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit: BPF prog-id=91 op=LOAD Oct 31 01:34:09.505000 audit: BPF prog-id=47 op=UNLOAD Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.505000 audit: BPF prog-id=92 op=LOAD Oct 31 01:34:09.505000 audit: BPF prog-id=48 op=UNLOAD Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit: BPF prog-id=93 op=LOAD Oct 31 01:34:09.507000 audit: BPF prog-id=55 op=UNLOAD Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit: BPF prog-id=94 op=LOAD Oct 31 01:34:09.508000 audit: BPF prog-id=49 op=UNLOAD Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit: BPF prog-id=95 op=LOAD Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.509000 audit: BPF prog-id=96 op=LOAD Oct 31 01:34:09.509000 audit: BPF prog-id=50 op=UNLOAD Oct 31 01:34:09.509000 audit: BPF prog-id=51 op=UNLOAD Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.510000 audit: BPF prog-id=97 op=LOAD Oct 31 01:34:09.510000 audit: BPF prog-id=52 op=UNLOAD Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit: BPF prog-id=98 op=LOAD Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:09.511000 audit: BPF prog-id=99 op=LOAD Oct 31 01:34:09.511000 audit: BPF prog-id=53 op=UNLOAD Oct 31 01:34:09.511000 audit: BPF prog-id=54 op=UNLOAD Oct 31 01:34:09.521882 systemd[1]: Stopping kubelet.service... Oct 31 01:34:09.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:09.540311 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:34:09.540434 systemd[1]: Stopped kubelet.service. Oct 31 01:34:09.542256 systemd[1]: Starting kubelet.service... Oct 31 01:34:10.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:10.233449 systemd[1]: Started kubelet.service. Oct 31 01:34:10.283608 kubelet[2113]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:34:10.283608 kubelet[2113]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:34:10.283608 kubelet[2113]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:34:10.283852 kubelet[2113]: I1031 01:34:10.283635 2113 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:34:10.301865 kubelet[2113]: I1031 01:34:10.301832 2113 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 31 01:34:10.301865 kubelet[2113]: I1031 01:34:10.301858 2113 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:34:10.305545 kubelet[2113]: I1031 01:34:10.305354 2113 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 01:34:10.307694 kubelet[2113]: I1031 01:34:10.307681 2113 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Oct 31 01:34:10.310003 kubelet[2113]: I1031 01:34:10.309646 2113 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:34:10.335244 kubelet[2113]: E1031 01:34:10.335221 2113 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:34:10.335366 kubelet[2113]: I1031 01:34:10.335356 2113 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:34:10.338901 kubelet[2113]: I1031 01:34:10.338881 2113 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:34:10.344912 kubelet[2113]: I1031 01:34:10.344864 2113 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:34:10.347591 kubelet[2113]: I1031 01:34:10.345077 2113 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:34:10.347760 kubelet[2113]: I1031 01:34:10.347749 2113 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:34:10.347809 kubelet[2113]: I1031 01:34:10.347802 2113 container_manager_linux.go:303] "Creating device plugin manager" Oct 31 01:34:10.359666 kubelet[2113]: I1031 01:34:10.359627 2113 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:10.359826 kubelet[2113]: I1031 01:34:10.359809 2113 kubelet.go:480] "Attempting to sync node with API server" Oct 31 01:34:10.359826 kubelet[2113]: I1031 01:34:10.359825 2113 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:34:10.359879 kubelet[2113]: I1031 01:34:10.359843 2113 kubelet.go:386] "Adding apiserver pod source" Oct 31 01:34:10.359879 kubelet[2113]: I1031 01:34:10.359854 2113 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:34:10.367012 kubelet[2113]: I1031 01:34:10.364962 2113 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:34:10.367012 kubelet[2113]: I1031 01:34:10.365392 2113 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 01:34:10.380647 kubelet[2113]: I1031 01:34:10.380619 2113 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:34:10.380758 kubelet[2113]: I1031 01:34:10.380675 2113 server.go:1289] "Started kubelet" Oct 31 01:34:10.381000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:10.381000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:10.382824 kubelet[2113]: I1031 01:34:10.382799 2113 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:34:10.381000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca0d50 a1=c00078b7d0 a2=c000ca0d20 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:10.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:10.397000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:10.397000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:10.397000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c3a5e0 a1=c000bae000 a2=c000bac060 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:10.397000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:10.398986 kubelet[2113]: I1031 01:34:10.398563 2113 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:34:10.398986 kubelet[2113]: I1031 01:34:10.398638 2113 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:34:10.398986 kubelet[2113]: I1031 01:34:10.398667 2113 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:34:10.403777 kubelet[2113]: I1031 01:34:10.403526 2113 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:34:10.405455 kubelet[2113]: I1031 01:34:10.405158 2113 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:34:10.409410 kubelet[2113]: I1031 01:34:10.409394 2113 server.go:317] "Adding debug handlers to kubelet server" Oct 31 01:34:10.409984 kubelet[2113]: I1031 01:34:10.409970 2113 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:34:10.410069 kubelet[2113]: I1031 01:34:10.410058 2113 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:34:10.410319 kubelet[2113]: I1031 01:34:10.410292 2113 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:34:10.410497 kubelet[2113]: I1031 01:34:10.410489 2113 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:34:10.412436 kubelet[2113]: I1031 01:34:10.412360 2113 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 31 01:34:10.413041 kubelet[2113]: I1031 01:34:10.412985 2113 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 31 01:34:10.413543 kubelet[2113]: I1031 01:34:10.413531 2113 factory.go:223] Registration of the systemd container factory successfully Oct 31 01:34:10.413603 kubelet[2113]: I1031 01:34:10.413589 2113 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:34:10.413896 kubelet[2113]: I1031 01:34:10.413887 2113 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 31 01:34:10.413954 kubelet[2113]: I1031 01:34:10.413947 2113 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:34:10.414000 kubelet[2113]: I1031 01:34:10.413993 2113 kubelet.go:2436] "Starting kubelet main sync loop" Oct 31 01:34:10.414105 kubelet[2113]: E1031 01:34:10.414083 2113 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 01:34:10.417809 kubelet[2113]: I1031 01:34:10.417789 2113 factory.go:223] Registration of the containerd container factory successfully Oct 31 01:34:10.451262 kubelet[2113]: I1031 01:34:10.451247 2113 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:34:10.451372 kubelet[2113]: I1031 01:34:10.451362 2113 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:34:10.451428 kubelet[2113]: I1031 01:34:10.451420 2113 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:34:10.451554 kubelet[2113]: I1031 01:34:10.451546 2113 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 31 01:34:10.451606 kubelet[2113]: I1031 01:34:10.451592 2113 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 31 01:34:10.452849 kubelet[2113]: I1031 01:34:10.452783 2113 policy_none.go:49] "None policy: Start" Oct 31 01:34:10.452912 kubelet[2113]: I1031 01:34:10.452904 2113 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:34:10.452962 kubelet[2113]: I1031 01:34:10.452955 2113 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:34:10.453081 kubelet[2113]: I1031 01:34:10.453073 2113 state_mem.go:75] "Updated machine memory state" Oct 31 01:34:10.455930 kubelet[2113]: E1031 01:34:10.455911 2113 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 01:34:10.454000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:10.454000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:34:10.454000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004ab3b0 a1=c000a36990 a2=c0004ab350 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:10.454000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:34:10.456216 kubelet[2113]: E1031 01:34:10.455965 2113 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 01:34:10.456216 kubelet[2113]: I1031 01:34:10.456092 2113 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:34:10.456216 kubelet[2113]: I1031 01:34:10.456100 2113 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:34:10.456701 kubelet[2113]: I1031 01:34:10.456454 2113 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:34:10.457825 kubelet[2113]: E1031 01:34:10.457815 2113 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:34:10.516665 kubelet[2113]: I1031 01:34:10.515454 2113 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:10.516665 kubelet[2113]: I1031 01:34:10.515744 2113 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:10.516836 kubelet[2113]: I1031 01:34:10.515463 2113 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.523205 kubelet[2113]: E1031 01:34:10.523179 2113 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.559437 kubelet[2113]: I1031 01:34:10.559416 2113 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Oct 31 01:34:10.565421 kubelet[2113]: I1031 01:34:10.565394 2113 kubelet_node_status.go:124] "Node was previously registered" node="localhost" Oct 31 01:34:10.565860 kubelet[2113]: I1031 01:34:10.565450 2113 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Oct 31 01:34:10.611447 kubelet[2113]: I1031 01:34:10.611424 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.611588 kubelet[2113]: I1031 01:34:10.611577 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.611674 kubelet[2113]: I1031 01:34:10.611665 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.611730 kubelet[2113]: I1031 01:34:10.611721 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:10.611786 kubelet[2113]: I1031 01:34:10.611777 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:10.611845 kubelet[2113]: I1031 01:34:10.611836 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/84316240f22e66b5e4a0dbe919986312-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"84316240f22e66b5e4a0dbe919986312\") " pod="kube-system/kube-apiserver-localhost" Oct 31 01:34:10.611903 kubelet[2113]: I1031 01:34:10.611894 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.611958 kubelet[2113]: I1031 01:34:10.611950 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/20c890a246d840d308022312da9174cb-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"20c890a246d840d308022312da9174cb\") " pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:10.612015 kubelet[2113]: I1031 01:34:10.612007 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d13d96f639b65e57f439b4396b605564-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d13d96f639b65e57f439b4396b605564\") " pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:10.630000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:10.630000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:10.630000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd0a80 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:10.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:10.630000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:10.630000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd0ac0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:10.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:10.630000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:34:10.630000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cd0b00 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:10.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:10.630000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d3eb20 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:10.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:11.364369 kubelet[2113]: I1031 01:34:11.364336 2113 apiserver.go:52] "Watching apiserver" Oct 31 01:34:11.410712 kubelet[2113]: I1031 01:34:11.410690 2113 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:34:11.439158 kubelet[2113]: I1031 01:34:11.439143 2113 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:11.439360 kubelet[2113]: I1031 01:34:11.439236 2113 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:11.443119 kubelet[2113]: E1031 01:34:11.443100 2113 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Oct 31 01:34:11.444379 kubelet[2113]: E1031 01:34:11.444331 2113 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 31 01:34:11.465134 kubelet[2113]: I1031 01:34:11.465101 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.465079697 podStartE2EDuration="1.465079697s" podCreationTimestamp="2025-10-31 01:34:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:34:11.452994865 +0000 UTC m=+1.210634666" watchObservedRunningTime="2025-10-31 01:34:11.465079697 +0000 UTC m=+1.222719491" Oct 31 01:34:11.465304 kubelet[2113]: I1031 01:34:11.465288 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.465284198 podStartE2EDuration="2.465284198s" podCreationTimestamp="2025-10-31 01:34:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:34:11.464979059 +0000 UTC m=+1.222618861" watchObservedRunningTime="2025-10-31 01:34:11.465284198 +0000 UTC m=+1.222923994" Oct 31 01:34:11.474509 kubelet[2113]: I1031 01:34:11.474476 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.474464679 podStartE2EDuration="1.474464679s" podCreationTimestamp="2025-10-31 01:34:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:34:11.469394045 +0000 UTC m=+1.227033847" watchObservedRunningTime="2025-10-31 01:34:11.474464679 +0000 UTC m=+1.232104476" Oct 31 01:34:13.005000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6797 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 01:34:13.006197 kernel: kauditd_printk_skb: 284 callbacks suppressed Oct 31 01:34:13.006243 kernel: audit: type=1400 audit(1761874453.005:777): avc: denied { watch } for pid=1963 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6797 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 01:34:13.005000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097a140 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:13.013359 kernel: audit: type=1300 audit(1761874453.005:777): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097a140 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:34:13.013396 kernel: audit: type=1327 audit(1761874453.005:777): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:13.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:34:15.356591 kubelet[2113]: I1031 01:34:15.356566 2113 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 31 01:34:15.356919 env[1250]: time="2025-10-31T01:34:15.356753834Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:34:15.357232 kubelet[2113]: I1031 01:34:15.357221 2113 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 31 01:34:15.969125 systemd[1]: Created slice kubepods-besteffort-pod3e624e66_00f6_4dac_bb6e_9b1042766cf9.slice. Oct 31 01:34:16.051402 kubelet[2113]: I1031 01:34:16.051378 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3e624e66-00f6-4dac-bb6e-9b1042766cf9-xtables-lock\") pod \"kube-proxy-xz9hv\" (UID: \"3e624e66-00f6-4dac-bb6e-9b1042766cf9\") " pod="kube-system/kube-proxy-xz9hv" Oct 31 01:34:16.051543 kubelet[2113]: I1031 01:34:16.051534 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3e624e66-00f6-4dac-bb6e-9b1042766cf9-lib-modules\") pod \"kube-proxy-xz9hv\" (UID: \"3e624e66-00f6-4dac-bb6e-9b1042766cf9\") " pod="kube-system/kube-proxy-xz9hv" Oct 31 01:34:16.051619 kubelet[2113]: I1031 01:34:16.051606 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fd9r8\" (UniqueName: \"kubernetes.io/projected/3e624e66-00f6-4dac-bb6e-9b1042766cf9-kube-api-access-fd9r8\") pod \"kube-proxy-xz9hv\" (UID: \"3e624e66-00f6-4dac-bb6e-9b1042766cf9\") " pod="kube-system/kube-proxy-xz9hv" Oct 31 01:34:16.051681 kubelet[2113]: I1031 01:34:16.051673 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3e624e66-00f6-4dac-bb6e-9b1042766cf9-kube-proxy\") pod \"kube-proxy-xz9hv\" (UID: \"3e624e66-00f6-4dac-bb6e-9b1042766cf9\") " pod="kube-system/kube-proxy-xz9hv" Oct 31 01:34:16.160745 kubelet[2113]: I1031 01:34:16.160719 2113 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:34:16.278807 env[1250]: time="2025-10-31T01:34:16.278421029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xz9hv,Uid:3e624e66-00f6-4dac-bb6e-9b1042766cf9,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:16.288162 env[1250]: time="2025-10-31T01:34:16.288035128Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:16.288162 env[1250]: time="2025-10-31T01:34:16.288065820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:16.288162 env[1250]: time="2025-10-31T01:34:16.288072714Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:16.288347 env[1250]: time="2025-10-31T01:34:16.288172982Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bee2f20e85fbb74c73e1cb091c20b9139c750c0a78e89ba09be24090c3fbbf4 pid=2166 runtime=io.containerd.runc.v2 Oct 31 01:34:16.299996 systemd[1]: Started cri-containerd-2bee2f20e85fbb74c73e1cb091c20b9139c750c0a78e89ba09be24090c3fbbf4.scope. Oct 31 01:34:16.312454 kernel: audit: type=1400 audit(1761874456.306:778): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.312518 kernel: audit: type=1400 audit(1761874456.306:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.312536 kernel: audit: type=1400 audit(1761874456.306:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.318048 kernel: audit: type=1400 audit(1761874456.306:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.321035 kernel: audit: type=1400 audit(1761874456.306:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.324041 kernel: audit: type=1400 audit(1761874456.306:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.327040 kernel: audit: type=1400 audit(1761874456.306:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.311000 audit: BPF prog-id=100 op=LOAD Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2166 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656532663230653835666262373463373365316362303931633230 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2166 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656532663230653835666262373463373365316362303931633230 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit: BPF prog-id=101 op=LOAD Oct 31 01:34:16.313000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002af4b0 items=0 ppid=2166 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656532663230653835666262373463373365316362303931633230 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.313000 audit: BPF prog-id=102 op=LOAD Oct 31 01:34:16.313000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002af4f8 items=0 ppid=2166 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656532663230653835666262373463373365316362303931633230 Oct 31 01:34:16.314000 audit: BPF prog-id=102 op=UNLOAD Oct 31 01:34:16.314000 audit: BPF prog-id=101 op=UNLOAD Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.314000 audit: BPF prog-id=103 op=LOAD Oct 31 01:34:16.314000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002af908 items=0 ppid=2166 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656532663230653835666262373463373365316362303931633230 Oct 31 01:34:16.334937 env[1250]: time="2025-10-31T01:34:16.334908001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xz9hv,Uid:3e624e66-00f6-4dac-bb6e-9b1042766cf9,Namespace:kube-system,Attempt:0,} returns sandbox id \"2bee2f20e85fbb74c73e1cb091c20b9139c750c0a78e89ba09be24090c3fbbf4\"" Oct 31 01:34:16.338303 env[1250]: time="2025-10-31T01:34:16.338278257Z" level=info msg="CreateContainer within sandbox \"2bee2f20e85fbb74c73e1cb091c20b9139c750c0a78e89ba09be24090c3fbbf4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:34:16.344612 env[1250]: time="2025-10-31T01:34:16.344477730Z" level=info msg="CreateContainer within sandbox \"2bee2f20e85fbb74c73e1cb091c20b9139c750c0a78e89ba09be24090c3fbbf4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"784883af3701db641180b7c3cf85161593cf3df7e7ffc771955d73545372b07c\"" Oct 31 01:34:16.345680 env[1250]: time="2025-10-31T01:34:16.345090278Z" level=info msg="StartContainer for \"784883af3701db641180b7c3cf85161593cf3df7e7ffc771955d73545372b07c\"" Oct 31 01:34:16.369839 systemd[1]: Created slice kubepods-besteffort-pod73e4b146_33df_46e3_9c69_d70bc08ecf25.slice. Oct 31 01:34:16.377185 systemd[1]: Started cri-containerd-784883af3701db641180b7c3cf85161593cf3df7e7ffc771955d73545372b07c.scope. Oct 31 01:34:16.404000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.404000 audit[2206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f304c6362f8 items=0 ppid=2166 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343838336166333730316462363431313830623763336366383531 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit: BPF prog-id=104 op=LOAD Oct 31 01:34:16.405000 audit[2206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000025378 items=0 ppid=2166 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343838336166333730316462363431313830623763336366383531 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.405000 audit: BPF prog-id=105 op=LOAD Oct 31 01:34:16.405000 audit[2206]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000253c8 items=0 ppid=2166 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343838336166333730316462363431313830623763336366383531 Oct 31 01:34:16.406000 audit: BPF prog-id=105 op=UNLOAD Oct 31 01:34:16.406000 audit: BPF prog-id=104 op=UNLOAD Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.406000 audit: BPF prog-id=106 op=LOAD Oct 31 01:34:16.406000 audit[2206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000025458 items=0 ppid=2166 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343838336166333730316462363431313830623763336366383531 Oct 31 01:34:16.415872 env[1250]: time="2025-10-31T01:34:16.415451746Z" level=info msg="StartContainer for \"784883af3701db641180b7c3cf85161593cf3df7e7ffc771955d73545372b07c\" returns successfully" Oct 31 01:34:16.456620 kubelet[2113]: I1031 01:34:16.456594 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8bvw\" (UniqueName: \"kubernetes.io/projected/73e4b146-33df-46e3-9c69-d70bc08ecf25-kube-api-access-r8bvw\") pod \"tigera-operator-7dcd859c48-gd2d6\" (UID: \"73e4b146-33df-46e3-9c69-d70bc08ecf25\") " pod="tigera-operator/tigera-operator-7dcd859c48-gd2d6" Oct 31 01:34:16.456620 kubelet[2113]: I1031 01:34:16.456618 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/73e4b146-33df-46e3-9c69-d70bc08ecf25-var-lib-calico\") pod \"tigera-operator-7dcd859c48-gd2d6\" (UID: \"73e4b146-33df-46e3-9c69-d70bc08ecf25\") " pod="tigera-operator/tigera-operator-7dcd859c48-gd2d6" Oct 31 01:34:16.673438 env[1250]: time="2025-10-31T01:34:16.673414789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-gd2d6,Uid:73e4b146-33df-46e3-9c69-d70bc08ecf25,Namespace:tigera-operator,Attempt:0,}" Oct 31 01:34:16.755407 env[1250]: time="2025-10-31T01:34:16.755355319Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:16.755545 env[1250]: time="2025-10-31T01:34:16.755390459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:16.755545 env[1250]: time="2025-10-31T01:34:16.755401865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:16.755677 env[1250]: time="2025-10-31T01:34:16.755586804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/827e4b570545046e5f3f0cde9b5655144fc55f30fbfff0e4a5c5a888611d2af0 pid=2242 runtime=io.containerd.runc.v2 Oct 31 01:34:16.765124 systemd[1]: Started cri-containerd-827e4b570545046e5f3f0cde9b5655144fc55f30fbfff0e4a5c5a888611d2af0.scope. Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit: BPF prog-id=107 op=LOAD Oct 31 01:34:16.775000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.775000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376534623537303534353034366535663366306364653962353635 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376534623537303534353034366535663366306364653962353635 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit: BPF prog-id=108 op=LOAD Oct 31 01:34:16.776000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003250e0 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376534623537303534353034366535663366306364653962353635 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.776000 audit: BPF prog-id=109 op=LOAD Oct 31 01:34:16.776000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000325128 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376534623537303534353034366535663366306364653962353635 Oct 31 01:34:16.777000 audit: BPF prog-id=109 op=UNLOAD Oct 31 01:34:16.777000 audit: BPF prog-id=108 op=UNLOAD Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:16.777000 audit: BPF prog-id=110 op=LOAD Oct 31 01:34:16.777000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000325538 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:16.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376534623537303534353034366535663366306364653962353635 Oct 31 01:34:16.800752 env[1250]: time="2025-10-31T01:34:16.800725600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-gd2d6,Uid:73e4b146-33df-46e3-9c69-d70bc08ecf25,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"827e4b570545046e5f3f0cde9b5655144fc55f30fbfff0e4a5c5a888611d2af0\"" Oct 31 01:34:16.802860 env[1250]: time="2025-10-31T01:34:16.802838874Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 31 01:34:17.309000 audit[2311]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.309000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd6ee3230 a2=0 a3=7ffdd6ee321c items=0 ppid=2217 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:34:17.310000 audit[2313]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.310000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea57e5840 a2=0 a3=7ffea57e582c items=0 ppid=2217 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:34:17.311000 audit[2314]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.311000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc765172e0 a2=0 a3=7ffc765172cc items=0 ppid=2217 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:34:17.322000 audit[2315]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.322000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbfd2d770 a2=0 a3=7fffbfd2d75c items=0 ppid=2217 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:34:17.322000 audit[2316]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.322000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe39326480 a2=0 a3=7ffe3932646c items=0 ppid=2217 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:34:17.323000 audit[2317]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.323000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc992e150 a2=0 a3=7fffc992e13c items=0 ppid=2217 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:34:17.451000 audit[2320]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.451000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc46bdb2d0 a2=0 a3=7ffc46bdb2bc items=0 ppid=2217 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:34:17.470000 audit[2322]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.470000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc88288cf0 a2=0 a3=7ffc88288cdc items=0 ppid=2217 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 01:34:17.476000 audit[2325]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.476000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffce80fa090 a2=0 a3=7ffce80fa07c items=0 ppid=2217 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 01:34:17.477000 audit[2326]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.477000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde6bd2930 a2=0 a3=7ffde6bd291c items=0 ppid=2217 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:34:17.479000 audit[2328]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.479000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2eeb75c0 a2=0 a3=7ffd2eeb75ac items=0 ppid=2217 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:34:17.480000 audit[2329]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.480000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe59a0d8f0 a2=0 a3=7ffe59a0d8dc items=0 ppid=2217 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:34:17.483000 audit[2331]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.483000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9c70f650 a2=0 a3=7ffe9c70f63c items=0 ppid=2217 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:34:17.486000 audit[2334]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.486000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea8559e40 a2=0 a3=7ffea8559e2c items=0 ppid=2217 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 01:34:17.487000 audit[2335]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.487000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2a5a3e50 a2=0 a3=7fff2a5a3e3c items=0 ppid=2217 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:34:17.489000 audit[2337]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.489000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd52b8b20 a2=0 a3=7fffd52b8b0c items=0 ppid=2217 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:34:17.490000 audit[2338]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.490000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4c6da340 a2=0 a3=7ffe4c6da32c items=0 ppid=2217 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:34:17.493000 audit[2340]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.493000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc15961010 a2=0 a3=7ffc15960ffc items=0 ppid=2217 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:34:17.496000 audit[2343]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.496000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3b3d46e0 a2=0 a3=7ffd3b3d46cc items=0 ppid=2217 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:34:17.499000 audit[2346]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.499000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd10d99810 a2=0 a3=7ffd10d997fc items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:34:17.500000 audit[2347]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.500000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9e08be00 a2=0 a3=7ffc9e08bdec items=0 ppid=2217 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:34:17.506000 audit[2349]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.506000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc41dcbef0 a2=0 a3=7ffc41dcbedc items=0 ppid=2217 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:17.508000 audit[2352]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.508000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8e921ab0 a2=0 a3=7ffd8e921a9c items=0 ppid=2217 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:17.509000 audit[2353]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.509000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2af77fe0 a2=0 a3=7ffc2af77fcc items=0 ppid=2217 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:34:17.511000 audit[2355]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:34:17.511000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe89ad3ee0 a2=0 a3=7ffe89ad3ecc items=0 ppid=2217 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:34:17.531608 kubelet[2113]: I1031 01:34:17.531574 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xz9hv" podStartSLOduration=2.531561331 podStartE2EDuration="2.531561331s" podCreationTimestamp="2025-10-31 01:34:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:34:16.467075971 +0000 UTC m=+6.224715774" watchObservedRunningTime="2025-10-31 01:34:17.531561331 +0000 UTC m=+7.289201128" Oct 31 01:34:17.598000 audit[2361]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:17.598000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd81d54e10 a2=0 a3=7ffd81d54dfc items=0 ppid=2217 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:17.625000 audit[2361]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:17.625000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd81d54e10 a2=0 a3=7ffd81d54dfc items=0 ppid=2217 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:17.626000 audit[2366]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.626000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd476a3f00 a2=0 a3=7ffd476a3eec items=0 ppid=2217 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:34:17.628000 audit[2368]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.628000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9d5495b0 a2=0 a3=7ffd9d54959c items=0 ppid=2217 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 01:34:17.630000 audit[2371]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.630000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffaaa06230 a2=0 a3=7fffaaa0621c items=0 ppid=2217 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 01:34:17.631000 audit[2372]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.631000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2c293250 a2=0 a3=7ffd2c29323c items=0 ppid=2217 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:34:17.632000 audit[2374]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.632000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebe0aa4b0 a2=0 a3=7ffebe0aa49c items=0 ppid=2217 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:34:17.633000 audit[2375]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.633000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa88e00a0 a2=0 a3=7fffa88e008c items=0 ppid=2217 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:34:17.635000 audit[2377]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.635000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4d2898f0 a2=0 a3=7ffd4d2898dc items=0 ppid=2217 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 01:34:17.637000 audit[2380]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.637000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffffedb9440 a2=0 a3=7ffffedb942c items=0 ppid=2217 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:34:17.638000 audit[2381]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.638000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff364dc860 a2=0 a3=7fff364dc84c items=0 ppid=2217 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:34:17.639000 audit[2383]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.639000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddde34f80 a2=0 a3=7ffddde34f6c items=0 ppid=2217 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:34:17.640000 audit[2384]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.640000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb07e19d0 a2=0 a3=7ffdb07e19bc items=0 ppid=2217 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:34:17.642000 audit[2386]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.642000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc731cb860 a2=0 a3=7ffc731cb84c items=0 ppid=2217 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:34:17.644000 audit[2389]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.644000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe45c9a220 a2=0 a3=7ffe45c9a20c items=0 ppid=2217 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:34:17.646000 audit[2392]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.646000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe59c30f80 a2=0 a3=7ffe59c30f6c items=0 ppid=2217 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 01:34:17.647000 audit[2393]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.647000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff88445ba0 a2=0 a3=7fff88445b8c items=0 ppid=2217 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:34:17.648000 audit[2395]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.648000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe179bf040 a2=0 a3=7ffe179bf02c items=0 ppid=2217 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:17.650000 audit[2398]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.650000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc4d33b570 a2=0 a3=7ffc4d33b55c items=0 ppid=2217 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:34:17.651000 audit[2399]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.651000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd49627030 a2=0 a3=7ffd4962701c items=0 ppid=2217 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:34:17.653000 audit[2401]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.653000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe44b74b00 a2=0 a3=7ffe44b74aec items=0 ppid=2217 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:34:17.653000 audit[2402]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.653000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4da6b8f0 a2=0 a3=7ffe4da6b8dc items=0 ppid=2217 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:34:17.655000 audit[2404]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.655000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff76594e50 a2=0 a3=7fff76594e3c items=0 ppid=2217 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:17.657000 audit[2407]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:34:17.657000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7828c0a0 a2=0 a3=7ffc7828c08c items=0 ppid=2217 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:34:17.659000 audit[2409]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:34:17.659000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe0a3d09a0 a2=0 a3=7ffe0a3d098c items=0 ppid=2217 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.659000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:17.659000 audit[2409]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:34:17.659000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe0a3d09a0 a2=0 a3=7ffe0a3d098c items=0 ppid=2217 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:17.659000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:17.907842 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount355583025.mount: Deactivated successfully. Oct 31 01:34:18.747162 env[1250]: time="2025-10-31T01:34:18.747126571Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:18.747909 env[1250]: time="2025-10-31T01:34:18.747893363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:18.748678 env[1250]: time="2025-10-31T01:34:18.748663871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:18.749493 env[1250]: time="2025-10-31T01:34:18.749479039Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:18.749887 env[1250]: time="2025-10-31T01:34:18.749862163Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 31 01:34:18.752671 env[1250]: time="2025-10-31T01:34:18.752650042Z" level=info msg="CreateContainer within sandbox \"827e4b570545046e5f3f0cde9b5655144fc55f30fbfff0e4a5c5a888611d2af0\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 31 01:34:18.759366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2027968947.mount: Deactivated successfully. Oct 31 01:34:18.773667 env[1250]: time="2025-10-31T01:34:18.773639001Z" level=info msg="CreateContainer within sandbox \"827e4b570545046e5f3f0cde9b5655144fc55f30fbfff0e4a5c5a888611d2af0\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f564a3b3bc667c19f4ae802b69cb50e362b56fc6cdd2e269186a807a96c08b34\"" Oct 31 01:34:18.774161 env[1250]: time="2025-10-31T01:34:18.774137203Z" level=info msg="StartContainer for \"f564a3b3bc667c19f4ae802b69cb50e362b56fc6cdd2e269186a807a96c08b34\"" Oct 31 01:34:18.785996 systemd[1]: Started cri-containerd-f564a3b3bc667c19f4ae802b69cb50e362b56fc6cdd2e269186a807a96c08b34.scope. Oct 31 01:34:18.808233 kernel: kauditd_printk_skb: 303 callbacks suppressed Oct 31 01:34:18.808323 kernel: audit: type=1400 audit(1761874458.799:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.808344 kernel: audit: type=1400 audit(1761874458.799:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.808359 kernel: audit: type=1400 audit(1761874458.799:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.811001 kernel: audit: type=1400 audit(1761874458.799:874): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.816163 kernel: audit: type=1400 audit(1761874458.799:875): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.816265 kernel: audit: type=1400 audit(1761874458.799:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.818947 kernel: audit: type=1400 audit(1761874458.799:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.822127 kernel: audit: type=1400 audit(1761874458.799:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.822170 kernel: audit: type=1400 audit(1761874458.799:879): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.799000 audit: BPF prog-id=111 op=LOAD Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2242 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:18.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363461336233626336363763313966346165383032623639636235 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2242 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:18.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363461336233626336363763313966346165383032623639636235 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.803000 audit: BPF prog-id=112 op=LOAD Oct 31 01:34:18.803000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025db40 items=0 ppid=2242 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:18.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363461336233626336363763313966346165383032623639636235 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit: BPF prog-id=113 op=LOAD Oct 31 01:34:18.804000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025db88 items=0 ppid=2242 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:18.833086 kernel: audit: type=1400 audit(1761874458.799:880): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363461336233626336363763313966346165383032623639636235 Oct 31 01:34:18.807000 audit: BPF prog-id=113 op=UNLOAD Oct 31 01:34:18.807000 audit: BPF prog-id=112 op=UNLOAD Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:18.807000 audit: BPF prog-id=114 op=LOAD Oct 31 01:34:18.807000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025df98 items=0 ppid=2242 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:18.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363461336233626336363763313966346165383032623639636235 Oct 31 01:34:18.838530 env[1250]: time="2025-10-31T01:34:18.838500933Z" level=info msg="StartContainer for \"f564a3b3bc667c19f4ae802b69cb50e362b56fc6cdd2e269186a807a96c08b34\" returns successfully" Oct 31 01:34:22.780734 kubelet[2113]: I1031 01:34:22.780696 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-gd2d6" podStartSLOduration=4.831648188 podStartE2EDuration="6.78068204s" podCreationTimestamp="2025-10-31 01:34:16 +0000 UTC" firstStartedPulling="2025-10-31 01:34:16.801558818 +0000 UTC m=+6.559198608" lastFinishedPulling="2025-10-31 01:34:18.750592669 +0000 UTC m=+8.508232460" observedRunningTime="2025-10-31 01:34:19.467137655 +0000 UTC m=+9.224777459" watchObservedRunningTime="2025-10-31 01:34:22.78068204 +0000 UTC m=+12.538321837" Oct 31 01:34:24.363000 audit[1472]: USER_END pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.364928 sudo[1472]: pam_unix(sudo:session): session closed for user root Oct 31 01:34:24.365661 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 31 01:34:24.365696 kernel: audit: type=1106 audit(1761874464.363:889): pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.364000 audit[1472]: CRED_DISP pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.371429 kernel: audit: type=1104 audit(1761874464.364:890): pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.379909 sshd[1469]: pam_unix(sshd:session): session closed for user core Oct 31 01:34:24.379000 audit[1469]: USER_END pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:24.379000 audit[1469]: CRED_DISP pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:24.388101 kernel: audit: type=1106 audit(1761874464.379:891): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:24.388173 kernel: audit: type=1104 audit(1761874464.379:892): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:34:24.390834 systemd[1]: sshd@6-139.178.70.108:22-147.75.109.163:38056.service: Deactivated successfully. Oct 31 01:34:24.391314 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 01:34:24.391397 systemd[1]: session-9.scope: Consumed 3.671s CPU time. Oct 31 01:34:24.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-147.75.109.163:38056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.394707 systemd-logind[1237]: Session 9 logged out. Waiting for processes to exit. Oct 31 01:34:24.395084 kernel: audit: type=1131 audit(1761874464.389:893): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-147.75.109.163:38056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:34:24.395377 systemd-logind[1237]: Removed session 9. Oct 31 01:34:24.700000 audit[2493]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.700000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff682ced60 a2=0 a3=7fff682ced4c items=0 ppid=2217 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.707828 kernel: audit: type=1325 audit(1761874464.700:894): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.707908 kernel: audit: type=1300 audit(1761874464.700:894): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff682ced60 a2=0 a3=7fff682ced4c items=0 ppid=2217 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:24.708000 audit[2493]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.713044 kernel: audit: type=1327 audit(1761874464.700:894): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:24.713107 kernel: audit: type=1325 audit(1761874464.708:895): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.708000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff682ced60 a2=0 a3=0 items=0 ppid=2217 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:24.720047 kernel: audit: type=1300 audit(1761874464.708:895): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff682ced60 a2=0 a3=0 items=0 ppid=2217 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.730000 audit[2495]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.730000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeb4caf4c0 a2=0 a3=7ffeb4caf4ac items=0 ppid=2217 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:24.734000 audit[2495]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:24.734000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeb4caf4c0 a2=0 a3=0 items=0 ppid=2217 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:24.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:26.421000 audit[2497]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:26.421000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc4a7a5aa0 a2=0 a3=7ffc4a7a5a8c items=0 ppid=2217 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:26.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:26.425000 audit[2497]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:26.425000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc4a7a5aa0 a2=0 a3=0 items=0 ppid=2217 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:26.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:27.440000 audit[2499]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:27.440000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff9b19f4a0 a2=0 a3=7fff9b19f48c items=0 ppid=2217 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:27.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:27.444000 audit[2499]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:27.444000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff9b19f4a0 a2=0 a3=0 items=0 ppid=2217 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:27.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:28.241000 audit[2501]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:28.241000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff62dc6d90 a2=0 a3=7fff62dc6d7c items=0 ppid=2217 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:28.245000 audit[2501]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:28.245000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff62dc6d90 a2=0 a3=0 items=0 ppid=2217 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:28.304977 systemd[1]: Created slice kubepods-besteffort-podb58f9d3d_7481_4d60_93ab_f192f7b7e58c.slice. Oct 31 01:34:28.331898 kubelet[2113]: I1031 01:34:28.330376 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wvlvz\" (UniqueName: \"kubernetes.io/projected/b58f9d3d-7481-4d60-93ab-f192f7b7e58c-kube-api-access-wvlvz\") pod \"calico-typha-79ccbdcd4c-hxllc\" (UID: \"b58f9d3d-7481-4d60-93ab-f192f7b7e58c\") " pod="calico-system/calico-typha-79ccbdcd4c-hxllc" Oct 31 01:34:28.331898 kubelet[2113]: I1031 01:34:28.330437 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b58f9d3d-7481-4d60-93ab-f192f7b7e58c-tigera-ca-bundle\") pod \"calico-typha-79ccbdcd4c-hxllc\" (UID: \"b58f9d3d-7481-4d60-93ab-f192f7b7e58c\") " pod="calico-system/calico-typha-79ccbdcd4c-hxllc" Oct 31 01:34:28.331898 kubelet[2113]: I1031 01:34:28.330457 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b58f9d3d-7481-4d60-93ab-f192f7b7e58c-typha-certs\") pod \"calico-typha-79ccbdcd4c-hxllc\" (UID: \"b58f9d3d-7481-4d60-93ab-f192f7b7e58c\") " pod="calico-system/calico-typha-79ccbdcd4c-hxllc" Oct 31 01:34:28.441945 systemd[1]: Created slice kubepods-besteffort-pod4007e118_02aa_4530_9921_e1112c31da95.slice. Oct 31 01:34:28.531853 kubelet[2113]: I1031 01:34:28.531772 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-var-run-calico\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.531989 kubelet[2113]: I1031 01:34:28.531979 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-cni-bin-dir\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532076 kubelet[2113]: I1031 01:34:28.532056 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-cni-log-dir\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532152 kubelet[2113]: I1031 01:34:28.532143 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4007e118-02aa-4530-9921-e1112c31da95-node-certs\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532208 kubelet[2113]: I1031 01:34:28.532199 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4007e118-02aa-4530-9921-e1112c31da95-tigera-ca-bundle\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532262 kubelet[2113]: I1031 01:34:28.532253 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-xtables-lock\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532320 kubelet[2113]: I1031 01:34:28.532310 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-flexvol-driver-host\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532378 kubelet[2113]: I1031 01:34:28.532367 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-cni-net-dir\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532432 kubelet[2113]: I1031 01:34:28.532424 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-var-lib-calico\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532490 kubelet[2113]: I1031 01:34:28.532481 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrfmt\" (UniqueName: \"kubernetes.io/projected/4007e118-02aa-4530-9921-e1112c31da95-kube-api-access-vrfmt\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532546 kubelet[2113]: I1031 01:34:28.532537 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-lib-modules\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.532613 kubelet[2113]: I1031 01:34:28.532594 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4007e118-02aa-4530-9921-e1112c31da95-policysync\") pod \"calico-node-rjxbp\" (UID: \"4007e118-02aa-4530-9921-e1112c31da95\") " pod="calico-system/calico-node-rjxbp" Oct 31 01:34:28.625328 env[1250]: time="2025-10-31T01:34:28.625080666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79ccbdcd4c-hxllc,Uid:b58f9d3d-7481-4d60-93ab-f192f7b7e58c,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:28.646416 kubelet[2113]: E1031 01:34:28.646395 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.646416 kubelet[2113]: W1031 01:34:28.646409 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.652790 kubelet[2113]: E1031 01:34:28.652759 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.664037 kubelet[2113]: E1031 01:34:28.662334 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:28.665427 env[1250]: time="2025-10-31T01:34:28.665357584Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:28.665709 env[1250]: time="2025-10-31T01:34:28.665671569Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:28.665786 env[1250]: time="2025-10-31T01:34:28.665767747Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:28.665956 env[1250]: time="2025-10-31T01:34:28.665938339Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45994117381a8f4411f4910b3e30479c1e9063e05984bb51d704d82ac6c1e496 pid=2516 runtime=io.containerd.runc.v2 Oct 31 01:34:28.687037 systemd[1]: Started cri-containerd-45994117381a8f4411f4910b3e30479c1e9063e05984bb51d704d82ac6c1e496.scope. Oct 31 01:34:28.721923 kubelet[2113]: E1031 01:34:28.721820 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.721923 kubelet[2113]: W1031 01:34:28.721838 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.721923 kubelet[2113]: E1031 01:34:28.721853 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.722212 kubelet[2113]: E1031 01:34:28.722144 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.722212 kubelet[2113]: W1031 01:34:28.722152 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.722212 kubelet[2113]: E1031 01:34:28.722160 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.722408 kubelet[2113]: E1031 01:34:28.722315 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.722408 kubelet[2113]: W1031 01:34:28.722321 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.722408 kubelet[2113]: E1031 01:34:28.722326 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.726110 kubelet[2113]: E1031 01:34:28.726089 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.726237 kubelet[2113]: W1031 01:34:28.726223 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.726323 kubelet[2113]: E1031 01:34:28.726312 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.726589 kubelet[2113]: E1031 01:34:28.726580 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.726654 kubelet[2113]: W1031 01:34:28.726643 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.726712 kubelet[2113]: E1031 01:34:28.726701 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.726880 kubelet[2113]: E1031 01:34:28.726873 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.726934 kubelet[2113]: W1031 01:34:28.726923 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.726991 kubelet[2113]: E1031 01:34:28.726982 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.727188 kubelet[2113]: E1031 01:34:28.727181 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.727259 kubelet[2113]: W1031 01:34:28.727248 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.727323 kubelet[2113]: E1031 01:34:28.727313 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.727485 kubelet[2113]: E1031 01:34:28.727477 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.727544 kubelet[2113]: W1031 01:34:28.727535 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.727600 kubelet[2113]: E1031 01:34:28.727592 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.727761 kubelet[2113]: E1031 01:34:28.727753 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.727822 kubelet[2113]: W1031 01:34:28.727813 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.727878 kubelet[2113]: E1031 01:34:28.727870 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.730127 kubelet[2113]: E1031 01:34:28.730101 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.730275 kubelet[2113]: W1031 01:34:28.730259 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.730359 kubelet[2113]: E1031 01:34:28.730345 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.730629 kubelet[2113]: E1031 01:34:28.730619 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.730690 kubelet[2113]: W1031 01:34:28.730679 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.730753 kubelet[2113]: E1031 01:34:28.730742 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.730947 kubelet[2113]: E1031 01:34:28.730937 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.731013 kubelet[2113]: W1031 01:34:28.731002 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.731084 kubelet[2113]: E1031 01:34:28.731072 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.732134 kubelet[2113]: E1031 01:34:28.732118 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.732230 kubelet[2113]: W1031 01:34:28.732216 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.732307 kubelet[2113]: E1031 01:34:28.732296 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.732501 kubelet[2113]: E1031 01:34:28.732493 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.732565 kubelet[2113]: W1031 01:34:28.732554 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.732619 kubelet[2113]: E1031 01:34:28.732610 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.732796 kubelet[2113]: E1031 01:34:28.732788 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.732863 kubelet[2113]: W1031 01:34:28.732854 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.732915 kubelet[2113]: E1031 01:34:28.732906 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.734280 kubelet[2113]: E1031 01:34:28.734258 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.734398 kubelet[2113]: W1031 01:34:28.734385 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.734463 kubelet[2113]: E1031 01:34:28.734452 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.734739 kubelet[2113]: E1031 01:34:28.734731 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.734798 kubelet[2113]: W1031 01:34:28.734789 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.734851 kubelet[2113]: E1031 01:34:28.734843 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.735074 kubelet[2113]: E1031 01:34:28.735065 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.735147 kubelet[2113]: W1031 01:34:28.735138 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.735204 kubelet[2113]: E1031 01:34:28.735193 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.735361 kubelet[2113]: E1031 01:34:28.735354 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.735414 kubelet[2113]: W1031 01:34:28.735405 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.735480 kubelet[2113]: E1031 01:34:28.735471 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.735631 kubelet[2113]: E1031 01:34:28.735625 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.735683 kubelet[2113]: W1031 01:34:28.735674 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.735751 kubelet[2113]: E1031 01:34:28.735741 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.736318 kubelet[2113]: E1031 01:34:28.736296 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.736318 kubelet[2113]: W1031 01:34:28.736310 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.736402 kubelet[2113]: E1031 01:34:28.736323 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.736402 kubelet[2113]: I1031 01:34:28.736345 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hg2fs\" (UniqueName: \"kubernetes.io/projected/47a38da1-fd15-4cb6-9f0a-aefa44fb658a-kube-api-access-hg2fs\") pod \"csi-node-driver-hszfb\" (UID: \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\") " pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:28.736473 kubelet[2113]: E1031 01:34:28.736462 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.736473 kubelet[2113]: W1031 01:34:28.736470 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.736566 kubelet[2113]: E1031 01:34:28.736476 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.736566 kubelet[2113]: I1031 01:34:28.736486 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/47a38da1-fd15-4cb6-9f0a-aefa44fb658a-socket-dir\") pod \"csi-node-driver-hszfb\" (UID: \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\") " pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:28.736606 kubelet[2113]: E1031 01:34:28.736580 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.736606 kubelet[2113]: W1031 01:34:28.736585 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.736606 kubelet[2113]: E1031 01:34:28.736590 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.736606 kubelet[2113]: I1031 01:34:28.736599 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/47a38da1-fd15-4cb6-9f0a-aefa44fb658a-varrun\") pod \"csi-node-driver-hszfb\" (UID: \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\") " pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:28.736899 kubelet[2113]: E1031 01:34:28.736684 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.736899 kubelet[2113]: W1031 01:34:28.736689 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.736899 kubelet[2113]: E1031 01:34:28.736695 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.736899 kubelet[2113]: I1031 01:34:28.736705 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/47a38da1-fd15-4cb6-9f0a-aefa44fb658a-registration-dir\") pod \"csi-node-driver-hszfb\" (UID: \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\") " pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:28.737039 kubelet[2113]: E1031 01:34:28.737029 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.737098 kubelet[2113]: W1031 01:34:28.737088 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.737150 kubelet[2113]: E1031 01:34:28.737140 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.738610 kubelet[2113]: E1031 01:34:28.738591 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.738718 kubelet[2113]: W1031 01:34:28.738706 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.738782 kubelet[2113]: E1031 01:34:28.738772 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.739015 kubelet[2113]: E1031 01:34:28.739007 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.739103 kubelet[2113]: W1031 01:34:28.739093 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.739154 kubelet[2113]: E1031 01:34:28.739145 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.739220 kubelet[2113]: I1031 01:34:28.739210 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/47a38da1-fd15-4cb6-9f0a-aefa44fb658a-kubelet-dir\") pod \"csi-node-driver-hszfb\" (UID: \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\") " pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:28.739346 kubelet[2113]: E1031 01:34:28.739325 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.739346 kubelet[2113]: W1031 01:34:28.739344 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.739405 kubelet[2113]: E1031 01:34:28.739352 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741116 kubelet[2113]: E1031 01:34:28.741095 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741116 kubelet[2113]: W1031 01:34:28.741110 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741242 kubelet[2113]: E1031 01:34:28.741126 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741291 kubelet[2113]: E1031 01:34:28.741280 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741291 kubelet[2113]: W1031 01:34:28.741287 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741347 kubelet[2113]: E1031 01:34:28.741293 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741404 kubelet[2113]: E1031 01:34:28.741395 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741404 kubelet[2113]: W1031 01:34:28.741402 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741476 kubelet[2113]: E1031 01:34:28.741407 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741507 kubelet[2113]: E1031 01:34:28.741494 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741507 kubelet[2113]: W1031 01:34:28.741499 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741507 kubelet[2113]: E1031 01:34:28.741504 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741588 kubelet[2113]: E1031 01:34:28.741578 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741588 kubelet[2113]: W1031 01:34:28.741585 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741653 kubelet[2113]: E1031 01:34:28.741590 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741705 kubelet[2113]: E1031 01:34:28.741695 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741705 kubelet[2113]: W1031 01:34:28.741703 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741774 kubelet[2113]: E1031 01:34:28.741713 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.741807 kubelet[2113]: E1031 01:34:28.741797 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.741807 kubelet[2113]: W1031 01:34:28.741804 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.741952 kubelet[2113]: E1031 01:34:28.741808 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.745552 env[1250]: time="2025-10-31T01:34:28.745291317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjxbp,Uid:4007e118-02aa-4530-9921-e1112c31da95,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:28.776043 env[1250]: time="2025-10-31T01:34:28.773829461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:28.776043 env[1250]: time="2025-10-31T01:34:28.773861141Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:28.776043 env[1250]: time="2025-10-31T01:34:28.773869180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:28.776432 env[1250]: time="2025-10-31T01:34:28.776267941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11 pid=2583 runtime=io.containerd.runc.v2 Oct 31 01:34:28.786631 systemd[1]: Started cri-containerd-dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11.scope. Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.814000 audit: BPF prog-id=115 op=LOAD Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=2516 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393934313137333831613866343431316634393130623365333034 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=2516 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393934313137333831613866343431316634393130623365333034 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.815000 audit: BPF prog-id=116 op=LOAD Oct 31 01:34:28.815000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000452840 items=0 ppid=2516 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393934313137333831613866343431316634393130623365333034 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.816000 audit: BPF prog-id=117 op=LOAD Oct 31 01:34:28.816000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000452888 items=0 ppid=2516 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393934313137333831613866343431316634393130623365333034 Oct 31 01:34:28.816000 audit: BPF prog-id=117 op=UNLOAD Oct 31 01:34:28.817000 audit: BPF prog-id=116 op=UNLOAD Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.817000 audit: BPF prog-id=118 op=LOAD Oct 31 01:34:28.817000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000452c98 items=0 ppid=2516 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393934313137333831613866343431316634393130623365333034 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.827000 audit: BPF prog-id=119 op=LOAD Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2583 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463653132336134363462663962643134616537396464633338636562 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2583 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463653132336134363462663962643134616537396464633338636562 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.828000 audit: BPF prog-id=120 op=LOAD Oct 31 01:34:28.828000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028f470 items=0 ppid=2583 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463653132336134363462663962643134616537396464633338636562 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit: BPF prog-id=121 op=LOAD Oct 31 01:34:28.829000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028f4b8 items=0 ppid=2583 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463653132336134363462663962643134616537396464633338636562 Oct 31 01:34:28.829000 audit: BPF prog-id=121 op=UNLOAD Oct 31 01:34:28.829000 audit: BPF prog-id=120 op=UNLOAD Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:28.829000 audit: BPF prog-id=122 op=LOAD Oct 31 01:34:28.829000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028f8c8 items=0 ppid=2583 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:28.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463653132336134363462663962643134616537396464633338636562 Oct 31 01:34:28.838003 env[1250]: time="2025-10-31T01:34:28.837966922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjxbp,Uid:4007e118-02aa-4530-9921-e1112c31da95,Namespace:calico-system,Attempt:0,} returns sandbox id \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\"" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840353 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841134 kubelet[2113]: W1031 01:34:28.840366 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840379 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840474 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841134 kubelet[2113]: W1031 01:34:28.840478 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840484 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840564 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841134 kubelet[2113]: W1031 01:34:28.840568 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840573 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841134 kubelet[2113]: E1031 01:34:28.840652 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841436 kubelet[2113]: W1031 01:34:28.840656 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840661 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840743 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841436 kubelet[2113]: W1031 01:34:28.840747 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840752 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840846 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841436 kubelet[2113]: W1031 01:34:28.840858 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840866 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841436 kubelet[2113]: E1031 01:34:28.840956 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841436 kubelet[2113]: W1031 01:34:28.840961 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841718 kubelet[2113]: E1031 01:34:28.840966 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.841718 kubelet[2113]: E1031 01:34:28.841066 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.841718 kubelet[2113]: W1031 01:34:28.841073 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.841718 kubelet[2113]: E1031 01:34:28.841078 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.844614 env[1250]: time="2025-10-31T01:34:28.843342489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843755 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.844832 kubelet[2113]: W1031 01:34:28.843766 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843776 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843883 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.844832 kubelet[2113]: W1031 01:34:28.843888 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843893 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843968 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.844832 kubelet[2113]: W1031 01:34:28.843972 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.843977 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.844832 kubelet[2113]: E1031 01:34:28.844099 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.845362 kubelet[2113]: W1031 01:34:28.844104 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844108 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844235 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.845362 kubelet[2113]: W1031 01:34:28.844241 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844261 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844378 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.845362 kubelet[2113]: W1031 01:34:28.844385 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844393 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.845362 kubelet[2113]: E1031 01:34:28.844532 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.845362 kubelet[2113]: W1031 01:34:28.844537 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.846074 kubelet[2113]: E1031 01:34:28.844543 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.846074 kubelet[2113]: E1031 01:34:28.844760 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.846074 kubelet[2113]: W1031 01:34:28.844766 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.846074 kubelet[2113]: E1031 01:34:28.844771 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.846434 kubelet[2113]: E1031 01:34:28.846381 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.846434 kubelet[2113]: W1031 01:34:28.846392 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.846434 kubelet[2113]: E1031 01:34:28.846400 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.846756 kubelet[2113]: E1031 01:34:28.846656 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.846756 kubelet[2113]: W1031 01:34:28.846678 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.846756 kubelet[2113]: E1031 01:34:28.846685 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.847064 kubelet[2113]: E1031 01:34:28.846961 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.847064 kubelet[2113]: W1031 01:34:28.846968 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.847064 kubelet[2113]: E1031 01:34:28.846975 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.847559 kubelet[2113]: E1031 01:34:28.847359 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.847559 kubelet[2113]: W1031 01:34:28.847367 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.847559 kubelet[2113]: E1031 01:34:28.847374 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.847559 kubelet[2113]: E1031 01:34:28.847466 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.847559 kubelet[2113]: W1031 01:34:28.847471 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.847559 kubelet[2113]: E1031 01:34:28.847476 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.850510 kubelet[2113]: E1031 01:34:28.850490 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.850510 kubelet[2113]: W1031 01:34:28.850503 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.850589 kubelet[2113]: E1031 01:34:28.850515 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.850701 kubelet[2113]: E1031 01:34:28.850684 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.850701 kubelet[2113]: W1031 01:34:28.850695 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.850760 kubelet[2113]: E1031 01:34:28.850702 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.851065 kubelet[2113]: E1031 01:34:28.851055 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.851065 kubelet[2113]: W1031 01:34:28.851063 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.851130 kubelet[2113]: E1031 01:34:28.851068 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.852064 kubelet[2113]: E1031 01:34:28.851323 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.852064 kubelet[2113]: W1031 01:34:28.851331 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.852064 kubelet[2113]: E1031 01:34:28.851338 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.857975 kubelet[2113]: E1031 01:34:28.857957 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:34:28.857975 kubelet[2113]: W1031 01:34:28.857970 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:34:28.858099 kubelet[2113]: E1031 01:34:28.857984 2113 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:34:28.867986 env[1250]: time="2025-10-31T01:34:28.867960629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79ccbdcd4c-hxllc,Uid:b58f9d3d-7481-4d60-93ab-f192f7b7e58c,Namespace:calico-system,Attempt:0,} returns sandbox id \"45994117381a8f4411f4910b3e30479c1e9063e05984bb51d704d82ac6c1e496\"" Oct 31 01:34:29.254000 audit[2654]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:29.254000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe1d976680 a2=0 a3=7ffe1d97666c items=0 ppid=2217 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:29.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:29.259000 audit[2654]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:29.259000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1d976680 a2=0 a3=0 items=0 ppid=2217 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:29.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:30.252527 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1150368616.mount: Deactivated successfully. Oct 31 01:34:30.330534 env[1250]: time="2025-10-31T01:34:30.330504250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:30.331341 env[1250]: time="2025-10-31T01:34:30.331320512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:30.332282 env[1250]: time="2025-10-31T01:34:30.332261888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:30.333003 env[1250]: time="2025-10-31T01:34:30.332983964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:30.333468 env[1250]: time="2025-10-31T01:34:30.333448275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:34:30.336059 env[1250]: time="2025-10-31T01:34:30.334614770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 31 01:34:30.341042 env[1250]: time="2025-10-31T01:34:30.340998322Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:34:30.349069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1600667905.mount: Deactivated successfully. Oct 31 01:34:30.350141 env[1250]: time="2025-10-31T01:34:30.350107547Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c\"" Oct 31 01:34:30.351066 env[1250]: time="2025-10-31T01:34:30.351011575Z" level=info msg="StartContainer for \"93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c\"" Oct 31 01:34:30.373236 systemd[1]: Started cri-containerd-93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c.scope. Oct 31 01:34:30.393796 kernel: kauditd_printk_skb: 145 callbacks suppressed Oct 31 01:34:30.393902 kernel: audit: type=1400 audit(1761874470.385:942): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393923 kernel: audit: type=1300 audit(1761874470.385:942): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8e39c96268 items=0 ppid=2583 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8e39c96268 items=0 ppid=2583 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:30.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439333762393136313439303365316163343638393539363431 Oct 31 01:34:30.398032 kernel: audit: type=1327 audit(1761874470.385:942): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439333762393136313439303365316163343638393539363431 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.403132 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.403160 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.405751 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.408366 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.409672 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.413893 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.415259 kernel: audit: type=1400 audit(1761874470.385:943): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.415325 kubelet[2113]: E1031 01:34:30.414385 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.385000 audit: BPF prog-id=123 op=LOAD Oct 31 01:34:30.385000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002c4218 items=0 ppid=2583 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:30.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439333762393136313439303365316163343638393539363431 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.386000 audit: BPF prog-id=124 op=LOAD Oct 31 01:34:30.386000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002c4268 items=0 ppid=2583 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:30.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439333762393136313439303365316163343638393539363431 Oct 31 01:34:30.393000 audit: BPF prog-id=124 op=UNLOAD Oct 31 01:34:30.393000 audit: BPF prog-id=123 op=UNLOAD Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:30.393000 audit: BPF prog-id=125 op=LOAD Oct 31 01:34:30.393000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002c42f8 items=0 ppid=2583 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:30.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933616439333762393136313439303365316163343638393539363431 Oct 31 01:34:30.433957 systemd[1]: cri-containerd-93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c.scope: Deactivated successfully. Oct 31 01:34:30.436201 env[1250]: time="2025-10-31T01:34:30.435971490Z" level=info msg="StartContainer for \"93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c\" returns successfully" Oct 31 01:34:30.438000 audit: BPF prog-id=125 op=UNLOAD Oct 31 01:34:30.453620 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c-rootfs.mount: Deactivated successfully. Oct 31 01:34:30.500242 env[1250]: time="2025-10-31T01:34:30.500186371Z" level=info msg="shim disconnected" id=93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c Oct 31 01:34:30.500242 env[1250]: time="2025-10-31T01:34:30.500237635Z" level=warning msg="cleaning up after shim disconnected" id=93ad937b91614903e1ac46895964195d9278d5db14417921e78631cb82dbac2c namespace=k8s.io Oct 31 01:34:30.500515 env[1250]: time="2025-10-31T01:34:30.500249393Z" level=info msg="cleaning up dead shim" Oct 31 01:34:30.516677 env[1250]: time="2025-10-31T01:34:30.514975105Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:34:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2701 runtime=io.containerd.runc.v2\n" Oct 31 01:34:32.415069 kubelet[2113]: E1031 01:34:32.414825 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:33.140331 env[1250]: time="2025-10-31T01:34:33.140277042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:33.153287 env[1250]: time="2025-10-31T01:34:33.152673054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:33.159558 env[1250]: time="2025-10-31T01:34:33.159532914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:33.166300 env[1250]: time="2025-10-31T01:34:33.166271742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:33.166472 env[1250]: time="2025-10-31T01:34:33.166454854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 31 01:34:33.167587 env[1250]: time="2025-10-31T01:34:33.167451626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:34:33.195392 env[1250]: time="2025-10-31T01:34:33.195360459Z" level=info msg="CreateContainer within sandbox \"45994117381a8f4411f4910b3e30479c1e9063e05984bb51d704d82ac6c1e496\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 31 01:34:33.256138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3864330403.mount: Deactivated successfully. Oct 31 01:34:33.293257 env[1250]: time="2025-10-31T01:34:33.293216979Z" level=info msg="CreateContainer within sandbox \"45994117381a8f4411f4910b3e30479c1e9063e05984bb51d704d82ac6c1e496\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"760e830dd269407d14fc40a4435bb3dbd5f64506c89d69f5574bd85ca593e651\"" Oct 31 01:34:33.294414 env[1250]: time="2025-10-31T01:34:33.294392096Z" level=info msg="StartContainer for \"760e830dd269407d14fc40a4435bb3dbd5f64506c89d69f5574bd85ca593e651\"" Oct 31 01:34:33.322282 systemd[1]: Started cri-containerd-760e830dd269407d14fc40a4435bb3dbd5f64506c89d69f5574bd85ca593e651.scope. Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.331000 audit: BPF prog-id=126 op=LOAD Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2516 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736306538333064643236393430376431346663343061343433356262 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2516 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736306538333064643236393430376431346663343061343433356262 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit: BPF prog-id=127 op=LOAD Oct 31 01:34:33.332000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002af770 items=0 ppid=2516 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736306538333064643236393430376431346663343061343433356262 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit: BPF prog-id=128 op=LOAD Oct 31 01:34:33.332000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002af7b8 items=0 ppid=2516 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736306538333064643236393430376431346663343061343433356262 Oct 31 01:34:33.332000 audit: BPF prog-id=128 op=UNLOAD Oct 31 01:34:33.332000 audit: BPF prog-id=127 op=UNLOAD Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:33.332000 audit: BPF prog-id=129 op=LOAD Oct 31 01:34:33.332000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002afbc8 items=0 ppid=2516 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736306538333064643236393430376431346663343061343433356262 Oct 31 01:34:33.365088 env[1250]: time="2025-10-31T01:34:33.365042898Z" level=info msg="StartContainer for \"760e830dd269407d14fc40a4435bb3dbd5f64506c89d69f5574bd85ca593e651\" returns successfully" Oct 31 01:34:34.330814 kubelet[2113]: I1031 01:34:34.330774 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-79ccbdcd4c-hxllc" podStartSLOduration=2.032392081 podStartE2EDuration="6.330759099s" podCreationTimestamp="2025-10-31 01:34:28 +0000 UTC" firstStartedPulling="2025-10-31 01:34:28.868820479 +0000 UTC m=+18.626460271" lastFinishedPulling="2025-10-31 01:34:33.167187497 +0000 UTC m=+22.924827289" observedRunningTime="2025-10-31 01:34:33.536002282 +0000 UTC m=+23.293642077" watchObservedRunningTime="2025-10-31 01:34:34.330759099 +0000 UTC m=+24.088398903" Oct 31 01:34:34.344000 audit[2761]: NETFILTER_CFG table=filter:101 family=2 entries=21 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:34.344000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcb4513e20 a2=0 a3=7ffcb4513e0c items=0 ppid=2217 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:34.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:34.348000 audit[2761]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:34.348000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcb4513e20 a2=0 a3=7ffcb4513e0c items=0 ppid=2217 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:34.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:34.415938 kubelet[2113]: E1031 01:34:34.415895 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:36.431637 kubelet[2113]: E1031 01:34:36.431594 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:38.415507 kubelet[2113]: E1031 01:34:38.415417 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:38.460745 env[1250]: time="2025-10-31T01:34:38.460718715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:38.479156 env[1250]: time="2025-10-31T01:34:38.479130174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:38.488161 env[1250]: time="2025-10-31T01:34:38.488133413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:38.497033 env[1250]: time="2025-10-31T01:34:38.496991048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:38.497443 env[1250]: time="2025-10-31T01:34:38.497424077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:34:38.511528 env[1250]: time="2025-10-31T01:34:38.511474146Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:34:38.558941 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount694979169.mount: Deactivated successfully. Oct 31 01:34:38.564216 env[1250]: time="2025-10-31T01:34:38.564183080Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0\"" Oct 31 01:34:38.565732 env[1250]: time="2025-10-31T01:34:38.565716120Z" level=info msg="StartContainer for \"b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0\"" Oct 31 01:34:38.587299 systemd[1]: Started cri-containerd-b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0.scope. Oct 31 01:34:38.614926 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 31 01:34:38.615058 kernel: audit: type=1400 audit(1761874478.605:969): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.615101 kernel: audit: type=1300 audit(1761874478.605:969): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2bec76d568 items=0 ppid=2583 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2bec76d568 items=0 ppid=2583 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:38.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234646232343831613436636332343239363136633638346531323961 Oct 31 01:34:38.620038 kernel: audit: type=1327 audit(1761874478.605:969): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234646232343831613436636332343239363136633638346531323961 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.626191 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.627361 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.633481 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.633579 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.640044 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.645053 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.648050 kernel: audit: type=1400 audit(1761874478.605:970): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.605000 audit: BPF prog-id=130 op=LOAD Oct 31 01:34:38.605000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000232208 items=0 ppid=2583 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:38.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234646232343831613436636332343239363136633638346531323961 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.609000 audit: BPF prog-id=131 op=LOAD Oct 31 01:34:38.609000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000232258 items=0 ppid=2583 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:38.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234646232343831613436636332343239363136633638346531323961 Oct 31 01:34:38.613000 audit: BPF prog-id=131 op=UNLOAD Oct 31 01:34:38.613000 audit: BPF prog-id=130 op=UNLOAD Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:38.613000 audit: BPF prog-id=132 op=LOAD Oct 31 01:34:38.613000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002322e8 items=0 ppid=2583 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:38.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234646232343831613436636332343239363136633638346531323961 Oct 31 01:34:38.649214 env[1250]: time="2025-10-31T01:34:38.649189362Z" level=info msg="StartContainer for \"b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0\" returns successfully" Oct 31 01:34:39.557920 systemd[1]: run-containerd-runc-k8s.io-b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0-runc.74diBU.mount: Deactivated successfully. Oct 31 01:34:40.415601 kubelet[2113]: E1031 01:34:40.415566 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:40.974247 env[1250]: time="2025-10-31T01:34:40.974176115Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:34:40.976373 systemd[1]: cri-containerd-b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0.scope: Deactivated successfully. Oct 31 01:34:40.979000 audit: BPF prog-id=132 op=UNLOAD Oct 31 01:34:41.002307 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0-rootfs.mount: Deactivated successfully. Oct 31 01:34:41.080374 kubelet[2113]: I1031 01:34:41.062105 2113 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 01:34:41.314924 systemd[1]: Created slice kubepods-burstable-podbaface2f_bddc_4c4d_8b58_0007db010995.slice. Oct 31 01:34:41.327822 systemd[1]: Created slice kubepods-besteffort-pod5edf9cae_9eb4_43f9_9dfa_cdffa758deb5.slice. Oct 31 01:34:41.332884 systemd[1]: Created slice kubepods-besteffort-pod37cef8c3_ac2b_4e5e_92c5_b48103b3c543.slice. Oct 31 01:34:41.347342 systemd[1]: Created slice kubepods-besteffort-pod1ebdd720_a8dd_405f_8dd3_22e46706aad8.slice. Oct 31 01:34:41.383401 kubelet[2113]: I1031 01:34:41.383364 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/37cef8c3-ac2b-4e5e-92c5-b48103b3c543-goldmane-ca-bundle\") pod \"goldmane-666569f655-vvvhd\" (UID: \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\") " pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:41.383814 kubelet[2113]: I1031 01:34:41.383801 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mgfl\" (UniqueName: \"kubernetes.io/projected/37cef8c3-ac2b-4e5e-92c5-b48103b3c543-kube-api-access-5mgfl\") pod \"goldmane-666569f655-vvvhd\" (UID: \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\") " pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:41.390506 kubelet[2113]: I1031 01:34:41.383977 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-br5ln\" (UniqueName: \"kubernetes.io/projected/baface2f-bddc-4c4d-8b58-0007db010995-kube-api-access-br5ln\") pod \"coredns-674b8bbfcf-rhh92\" (UID: \"baface2f-bddc-4c4d-8b58-0007db010995\") " pod="kube-system/coredns-674b8bbfcf-rhh92" Oct 31 01:34:41.390506 kubelet[2113]: I1031 01:34:41.383993 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8tj2g\" (UniqueName: \"kubernetes.io/projected/5edf9cae-9eb4-43f9-9dfa-cdffa758deb5-kube-api-access-8tj2g\") pod \"calico-kube-controllers-c968f69f7-xxxq9\" (UID: \"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5\") " pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" Oct 31 01:34:41.390506 kubelet[2113]: I1031 01:34:41.384007 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-backend-key-pair\") pod \"whisker-dfbf68594-nwhp9\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " pod="calico-system/whisker-dfbf68594-nwhp9" Oct 31 01:34:41.390506 kubelet[2113]: I1031 01:34:41.384032 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwhnh\" (UniqueName: \"kubernetes.io/projected/1ebdd720-a8dd-405f-8dd3-22e46706aad8-kube-api-access-qwhnh\") pod \"whisker-dfbf68594-nwhp9\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " pod="calico-system/whisker-dfbf68594-nwhp9" Oct 31 01:34:41.390506 kubelet[2113]: I1031 01:34:41.384048 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/37cef8c3-ac2b-4e5e-92c5-b48103b3c543-config\") pod \"goldmane-666569f655-vvvhd\" (UID: \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\") " pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:41.388715 systemd[1]: Created slice kubepods-besteffort-pod219495e8_c37f_4fb2_a42b_662657c7b41b.slice. Oct 31 01:34:41.397244 kubelet[2113]: I1031 01:34:41.384064 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/37cef8c3-ac2b-4e5e-92c5-b48103b3c543-goldmane-key-pair\") pod \"goldmane-666569f655-vvvhd\" (UID: \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\") " pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:41.397244 kubelet[2113]: I1031 01:34:41.384076 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/219495e8-c37f-4fb2-a42b-662657c7b41b-calico-apiserver-certs\") pod \"calico-apiserver-7cd95f4479-rxdv6\" (UID: \"219495e8-c37f-4fb2-a42b-662657c7b41b\") " pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" Oct 31 01:34:41.397244 kubelet[2113]: I1031 01:34:41.384093 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76z8v\" (UniqueName: \"kubernetes.io/projected/219495e8-c37f-4fb2-a42b-662657c7b41b-kube-api-access-76z8v\") pod \"calico-apiserver-7cd95f4479-rxdv6\" (UID: \"219495e8-c37f-4fb2-a42b-662657c7b41b\") " pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" Oct 31 01:34:41.397244 kubelet[2113]: I1031 01:34:41.384126 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-ca-bundle\") pod \"whisker-dfbf68594-nwhp9\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " pod="calico-system/whisker-dfbf68594-nwhp9" Oct 31 01:34:41.397244 kubelet[2113]: I1031 01:34:41.384142 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/baface2f-bddc-4c4d-8b58-0007db010995-config-volume\") pod \"coredns-674b8bbfcf-rhh92\" (UID: \"baface2f-bddc-4c4d-8b58-0007db010995\") " pod="kube-system/coredns-674b8bbfcf-rhh92" Oct 31 01:34:41.394762 systemd[1]: Created slice kubepods-burstable-pode490228c_8cd4_4797_8ffe_a03a98da650a.slice. Oct 31 01:34:41.413900 env[1250]: time="2025-10-31T01:34:41.400429102Z" level=info msg="shim disconnected" id=b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0 Oct 31 01:34:41.413900 env[1250]: time="2025-10-31T01:34:41.400457756Z" level=warning msg="cleaning up after shim disconnected" id=b4db2481a46cc2429616c684e129a777165ddb5b53c9116c2789a7f8dc47e2c0 namespace=k8s.io Oct 31 01:34:41.413900 env[1250]: time="2025-10-31T01:34:41.400463990Z" level=info msg="cleaning up dead shim" Oct 31 01:34:41.414040 kubelet[2113]: I1031 01:34:41.384156 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5edf9cae-9eb4-43f9-9dfa-cdffa758deb5-tigera-ca-bundle\") pod \"calico-kube-controllers-c968f69f7-xxxq9\" (UID: \"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5\") " pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" Oct 31 01:34:41.399741 systemd[1]: Created slice kubepods-besteffort-pod258790e9_2d5b_4190_a0c6_8d34fb61e286.slice. Oct 31 01:34:41.417832 env[1250]: time="2025-10-31T01:34:41.417807737Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:34:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2810 runtime=io.containerd.runc.v2\n" Oct 31 01:34:41.485188 kubelet[2113]: I1031 01:34:41.485151 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zjmkz\" (UniqueName: \"kubernetes.io/projected/e490228c-8cd4-4797-8ffe-a03a98da650a-kube-api-access-zjmkz\") pod \"coredns-674b8bbfcf-8ch7c\" (UID: \"e490228c-8cd4-4797-8ffe-a03a98da650a\") " pod="kube-system/coredns-674b8bbfcf-8ch7c" Oct 31 01:34:41.485496 kubelet[2113]: I1031 01:34:41.485187 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxjlh\" (UniqueName: \"kubernetes.io/projected/258790e9-2d5b-4190-a0c6-8d34fb61e286-kube-api-access-hxjlh\") pod \"calico-apiserver-7cd95f4479-qsrbm\" (UID: \"258790e9-2d5b-4190-a0c6-8d34fb61e286\") " pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" Oct 31 01:34:41.485533 kubelet[2113]: I1031 01:34:41.485513 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e490228c-8cd4-4797-8ffe-a03a98da650a-config-volume\") pod \"coredns-674b8bbfcf-8ch7c\" (UID: \"e490228c-8cd4-4797-8ffe-a03a98da650a\") " pod="kube-system/coredns-674b8bbfcf-8ch7c" Oct 31 01:34:41.485560 kubelet[2113]: I1031 01:34:41.485538 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/258790e9-2d5b-4190-a0c6-8d34fb61e286-calico-apiserver-certs\") pod \"calico-apiserver-7cd95f4479-qsrbm\" (UID: \"258790e9-2d5b-4190-a0c6-8d34fb61e286\") " pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" Oct 31 01:34:41.512794 env[1250]: time="2025-10-31T01:34:41.509719466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:34:41.617044 env[1250]: time="2025-10-31T01:34:41.616998188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-rhh92,Uid:baface2f-bddc-4c4d-8b58-0007db010995,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:41.630997 env[1250]: time="2025-10-31T01:34:41.630833664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c968f69f7-xxxq9,Uid:5edf9cae-9eb4-43f9-9dfa-cdffa758deb5,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:41.641941 env[1250]: time="2025-10-31T01:34:41.641786564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-vvvhd,Uid:37cef8c3-ac2b-4e5e-92c5-b48103b3c543,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:41.652898 env[1250]: time="2025-10-31T01:34:41.652749851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-dfbf68594-nwhp9,Uid:1ebdd720-a8dd-405f-8dd3-22e46706aad8,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:41.698041 env[1250]: time="2025-10-31T01:34:41.697920684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-rxdv6,Uid:219495e8-c37f-4fb2-a42b-662657c7b41b,Namespace:calico-apiserver,Attempt:0,}" Oct 31 01:34:41.698137 env[1250]: time="2025-10-31T01:34:41.698121602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8ch7c,Uid:e490228c-8cd4-4797-8ffe-a03a98da650a,Namespace:kube-system,Attempt:0,}" Oct 31 01:34:41.703792 env[1250]: time="2025-10-31T01:34:41.703761289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-qsrbm,Uid:258790e9-2d5b-4190-a0c6-8d34fb61e286,Namespace:calico-apiserver,Attempt:0,}" Oct 31 01:34:42.418806 systemd[1]: Created slice kubepods-besteffort-pod47a38da1_fd15_4cb6_9f0a_aefa44fb658a.slice. Oct 31 01:34:42.420609 env[1250]: time="2025-10-31T01:34:42.420589885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hszfb,Uid:47a38da1-fd15-4cb6-9f0a-aefa44fb658a,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:44.574849 env[1250]: time="2025-10-31T01:34:44.574795697Z" level=error msg="Failed to destroy network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.585134 env[1250]: time="2025-10-31T01:34:44.576678094Z" level=error msg="encountered an error cleaning up failed sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.585134 env[1250]: time="2025-10-31T01:34:44.576726760Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-qsrbm,Uid:258790e9-2d5b-4190-a0c6-8d34fb61e286,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.576339 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236-shm.mount: Deactivated successfully. Oct 31 01:34:44.593798 env[1250]: time="2025-10-31T01:34:44.593754563Z" level=error msg="Failed to destroy network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.595850 env[1250]: time="2025-10-31T01:34:44.595641064Z" level=error msg="encountered an error cleaning up failed sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.595265 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c-shm.mount: Deactivated successfully. Oct 31 01:34:44.606088 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779-shm.mount: Deactivated successfully. Oct 31 01:34:44.607301 kubelet[2113]: E1031 01:34:44.599924 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.607301 kubelet[2113]: E1031 01:34:44.601993 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.607506 env[1250]: time="2025-10-31T01:34:44.596949891Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-vvvhd,Uid:37cef8c3-ac2b-4e5e-92c5-b48103b3c543,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.607506 env[1250]: time="2025-10-31T01:34:44.604616702Z" level=error msg="Failed to destroy network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.607506 env[1250]: time="2025-10-31T01:34:44.606924388Z" level=error msg="encountered an error cleaning up failed sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.607506 env[1250]: time="2025-10-31T01:34:44.606977287Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-dfbf68594-nwhp9,Uid:1ebdd720-a8dd-405f-8dd3-22e46706aad8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.618806 env[1250]: time="2025-10-31T01:34:44.618767034Z" level=error msg="Failed to destroy network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.621272 env[1250]: time="2025-10-31T01:34:44.620446817Z" level=error msg="encountered an error cleaning up failed sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.621272 env[1250]: time="2025-10-31T01:34:44.620484147Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8ch7c,Uid:e490228c-8cd4-4797-8ffe-a03a98da650a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.630812 kubelet[2113]: E1031 01:34:44.621087 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" Oct 31 01:34:44.630812 kubelet[2113]: E1031 01:34:44.630093 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.630812 kubelet[2113]: E1031 01:34:44.630131 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8ch7c" Oct 31 01:34:44.620241 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1-shm.mount: Deactivated successfully. Oct 31 01:34:44.644857 kubelet[2113]: E1031 01:34:44.644516 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:44.644857 kubelet[2113]: E1031 01:34:44.644565 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-vvvhd" Oct 31 01:34:44.644857 kubelet[2113]: E1031 01:34:44.644614 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:34:44.645860 kubelet[2113]: E1031 01:34:44.644814 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.646030 kubelet[2113]: E1031 01:34:44.645975 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-dfbf68594-nwhp9" Oct 31 01:34:44.646030 kubelet[2113]: E1031 01:34:44.646003 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-dfbf68594-nwhp9" Oct 31 01:34:44.646312 kubelet[2113]: E1031 01:34:44.646114 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-dfbf68594-nwhp9_calico-system(1ebdd720-a8dd-405f-8dd3-22e46706aad8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-dfbf68594-nwhp9_calico-system(1ebdd720-a8dd-405f-8dd3-22e46706aad8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-dfbf68594-nwhp9" podUID="1ebdd720-a8dd-405f-8dd3-22e46706aad8" Oct 31 01:34:44.646312 kubelet[2113]: E1031 01:34:44.646148 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8ch7c" Oct 31 01:34:44.646312 kubelet[2113]: E1031 01:34:44.646167 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-8ch7c_kube-system(e490228c-8cd4-4797-8ffe-a03a98da650a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-8ch7c_kube-system(e490228c-8cd4-4797-8ffe-a03a98da650a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8ch7c" podUID="e490228c-8cd4-4797-8ffe-a03a98da650a" Oct 31 01:34:44.650426 kubelet[2113]: E1031 01:34:44.648863 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.650426 kubelet[2113]: E1031 01:34:44.648903 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-rhh92" Oct 31 01:34:44.650426 kubelet[2113]: E1031 01:34:44.648920 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-rhh92" Oct 31 01:34:44.647957 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012-shm.mount: Deactivated successfully. Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.646522159Z" level=error msg="Failed to destroy network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.648691249Z" level=error msg="encountered an error cleaning up failed sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.648736497Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-rhh92,Uid:baface2f-bddc-4c4d-8b58-0007db010995,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.652134489Z" level=error msg="Failed to destroy network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.652438183Z" level=error msg="encountered an error cleaning up failed sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.652473213Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-rxdv6,Uid:219495e8-c37f-4fb2-a42b-662657c7b41b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.654878856Z" level=error msg="Failed to destroy network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.655225406Z" level=error msg="encountered an error cleaning up failed sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.655266000Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c968f69f7-xxxq9,Uid:5edf9cae-9eb4-43f9-9dfa-cdffa758deb5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.655910247Z" level=error msg="Failed to destroy network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.656132886Z" level=error msg="encountered an error cleaning up failed sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.656363 env[1250]: time="2025-10-31T01:34:44.656161279Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hszfb,Uid:47a38da1-fd15-4cb6-9f0a-aefa44fb658a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.661912 kubelet[2113]: E1031 01:34:44.648948 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-rhh92_kube-system(baface2f-bddc-4c4d-8b58-0007db010995)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-rhh92_kube-system(baface2f-bddc-4c4d-8b58-0007db010995)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-rhh92" podUID="baface2f-bddc-4c4d-8b58-0007db010995" Oct 31 01:34:44.661912 kubelet[2113]: E1031 01:34:44.652155 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" Oct 31 01:34:44.661912 kubelet[2113]: E1031 01:34:44.652208 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:34:44.662088 kubelet[2113]: E1031 01:34:44.652590 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.662088 kubelet[2113]: E1031 01:34:44.652612 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" Oct 31 01:34:44.662088 kubelet[2113]: E1031 01:34:44.652626 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" Oct 31 01:34:44.662162 kubelet[2113]: E1031 01:34:44.652645 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:34:44.662162 kubelet[2113]: E1031 01:34:44.655431 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.662162 kubelet[2113]: E1031 01:34:44.655482 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" Oct 31 01:34:44.662248 kubelet[2113]: E1031 01:34:44.655504 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" Oct 31 01:34:44.662248 kubelet[2113]: E1031 01:34:44.655553 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:34:44.662248 kubelet[2113]: E1031 01:34:44.656804 2113 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:44.662347 kubelet[2113]: E1031 01:34:44.656826 2113 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:44.662347 kubelet[2113]: E1031 01:34:44.656850 2113 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hszfb" Oct 31 01:34:44.662347 kubelet[2113]: E1031 01:34:44.656875 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:45.515191 kubelet[2113]: I1031 01:34:45.515168 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:45.516091 kubelet[2113]: I1031 01:34:45.516073 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:45.557816 kubelet[2113]: I1031 01:34:45.557577 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:45.564037 kubelet[2113]: I1031 01:34:45.558287 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:45.564037 kubelet[2113]: I1031 01:34:45.558836 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:45.564037 kubelet[2113]: I1031 01:34:45.559507 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:45.564037 kubelet[2113]: I1031 01:34:45.560091 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:45.564037 kubelet[2113]: I1031 01:34:45.560578 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:34:45.576294 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396-shm.mount: Deactivated successfully. Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.589659146Z" level=info msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.589950166Z" level=info msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590156023Z" level=info msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590289369Z" level=info msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590479756Z" level=info msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590623828Z" level=info msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590764254Z" level=info msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" Oct 31 01:34:45.605462 env[1250]: time="2025-10-31T01:34:45.590893165Z" level=info msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" Oct 31 01:34:45.576349 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2-shm.mount: Deactivated successfully. Oct 31 01:34:45.576387 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b-shm.mount: Deactivated successfully. Oct 31 01:34:45.633191 env[1250]: time="2025-10-31T01:34:45.633149246Z" level=error msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" failed" error="failed to destroy network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.637674 kubelet[2113]: E1031 01:34:45.637640 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:45.637884 kubelet[2113]: E1031 01:34:45.637700 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396"} Oct 31 01:34:45.637884 kubelet[2113]: E1031 01:34:45.637741 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.637884 kubelet[2113]: E1031 01:34:45.637756 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47a38da1-fd15-4cb6-9f0a-aefa44fb658a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:45.671496 env[1250]: time="2025-10-31T01:34:45.671436212Z" level=error msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" failed" error="failed to destroy network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.683370 env[1250]: time="2025-10-31T01:34:45.671954292Z" level=error msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" failed" error="failed to destroy network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.683370 env[1250]: time="2025-10-31T01:34:45.673297853Z" level=error msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" failed" error="failed to destroy network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.683370 env[1250]: time="2025-10-31T01:34:45.673741777Z" level=error msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" failed" error="failed to destroy network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.683370 env[1250]: time="2025-10-31T01:34:45.680294387Z" level=error msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" failed" error="failed to destroy network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.683511 kubelet[2113]: E1031 01:34:45.672652 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:45.683511 kubelet[2113]: E1031 01:34:45.672682 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779"} Oct 31 01:34:45.683511 kubelet[2113]: E1031 01:34:45.672712 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.683511 kubelet[2113]: E1031 01:34:45.672727 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-dfbf68594-nwhp9" podUID="1ebdd720-a8dd-405f-8dd3-22e46706aad8" Oct 31 01:34:45.683648 kubelet[2113]: E1031 01:34:45.672766 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:34:45.683648 kubelet[2113]: E1031 01:34:45.672781 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236"} Oct 31 01:34:45.683648 kubelet[2113]: E1031 01:34:45.672794 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"258790e9-2d5b-4190-a0c6-8d34fb61e286\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.683648 kubelet[2113]: E1031 01:34:45.672804 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"258790e9-2d5b-4190-a0c6-8d34fb61e286\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:34:45.683861 kubelet[2113]: E1031 01:34:45.673467 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:45.683861 kubelet[2113]: E1031 01:34:45.673483 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2"} Oct 31 01:34:45.683861 kubelet[2113]: E1031 01:34:45.673497 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"219495e8-c37f-4fb2-a42b-662657c7b41b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.683861 kubelet[2113]: E1031 01:34:45.673510 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"219495e8-c37f-4fb2-a42b-662657c7b41b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:34:45.683981 kubelet[2113]: E1031 01:34:45.673826 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:45.683981 kubelet[2113]: E1031 01:34:45.673843 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c"} Oct 31 01:34:45.683981 kubelet[2113]: E1031 01:34:45.673858 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.683981 kubelet[2113]: E1031 01:34:45.673869 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"37cef8c3-ac2b-4e5e-92c5-b48103b3c543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:34:45.684121 kubelet[2113]: E1031 01:34:45.680470 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:45.684121 kubelet[2113]: E1031 01:34:45.680503 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012"} Oct 31 01:34:45.684121 kubelet[2113]: E1031 01:34:45.680523 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"baface2f-bddc-4c4d-8b58-0007db010995\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.684121 kubelet[2113]: E1031 01:34:45.680539 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"baface2f-bddc-4c4d-8b58-0007db010995\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-rhh92" podUID="baface2f-bddc-4c4d-8b58-0007db010995" Oct 31 01:34:45.687421 env[1250]: time="2025-10-31T01:34:45.687388303Z" level=error msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" failed" error="failed to destroy network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.687654 kubelet[2113]: E1031 01:34:45.687629 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:45.687697 kubelet[2113]: E1031 01:34:45.687662 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1"} Oct 31 01:34:45.687697 kubelet[2113]: E1031 01:34:45.687685 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e490228c-8cd4-4797-8ffe-a03a98da650a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.689562 kubelet[2113]: E1031 01:34:45.687699 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e490228c-8cd4-4797-8ffe-a03a98da650a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8ch7c" podUID="e490228c-8cd4-4797-8ffe-a03a98da650a" Oct 31 01:34:45.691266 env[1250]: time="2025-10-31T01:34:45.691219889Z" level=error msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" failed" error="failed to destroy network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:34:45.691471 kubelet[2113]: E1031 01:34:45.691431 2113 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:45.691528 kubelet[2113]: E1031 01:34:45.691479 2113 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b"} Oct 31 01:34:45.691558 kubelet[2113]: E1031 01:34:45.691513 2113 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:34:45.691601 kubelet[2113]: E1031 01:34:45.691565 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:34:49.102901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1727027982.mount: Deactivated successfully. Oct 31 01:34:49.232233 env[1250]: time="2025-10-31T01:34:49.232197676Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.244886 env[1250]: time="2025-10-31T01:34:49.244855820Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.246191 env[1250]: time="2025-10-31T01:34:49.246164317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.246971 env[1250]: time="2025-10-31T01:34:49.246954205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:34:49.247312 env[1250]: time="2025-10-31T01:34:49.247292399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:34:49.294042 env[1250]: time="2025-10-31T01:34:49.293994493Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:34:49.309133 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3397011178.mount: Deactivated successfully. Oct 31 01:34:49.345278 env[1250]: time="2025-10-31T01:34:49.345236376Z" level=info msg="CreateContainer within sandbox \"dce123a464bf9bd14ae79ddc38ceb15b5cb6e2298a8e60f25bf4dc565f5bff11\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2\"" Oct 31 01:34:49.358979 env[1250]: time="2025-10-31T01:34:49.358614883Z" level=info msg="StartContainer for \"541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2\"" Oct 31 01:34:49.410037 systemd[1]: Started cri-containerd-541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2.scope. Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.482554 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 01:34:49.492159 kernel: audit: type=1400 audit(1761874489.433:976): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.492221 kernel: audit: type=1300 audit(1761874489.433:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fc5d085be68 items=0 ppid=2583 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.492252 kernel: audit: type=1327 audit(1761874489.433:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316664643838656361326132656336633863306538626239643339 Oct 31 01:34:49.497536 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.505072 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.505128 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.505156 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.510980 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.511010 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.511047 kernel: audit: type=1400 audit(1761874489.433:977): avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fc5d085be68 items=0 ppid=2583 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316664643838656361326132656336633863306538626239643339 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit: BPF prog-id=133 op=LOAD Oct 31 01:34:49.433000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0001917a8 items=0 ppid=2583 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316664643838656361326132656336633863306538626239643339 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit: BPF prog-id=134 op=LOAD Oct 31 01:34:49.433000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0001917f8 items=0 ppid=2583 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316664643838656361326132656336633863306538626239643339 Oct 31 01:34:49.433000 audit: BPF prog-id=134 op=UNLOAD Oct 31 01:34:49.433000 audit: BPF prog-id=133 op=UNLOAD Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:49.433000 audit: BPF prog-id=135 op=LOAD Oct 31 01:34:49.433000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000191888 items=0 ppid=2583 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316664643838656361326132656336633863306538626239643339 Oct 31 01:34:49.563136 env[1250]: time="2025-10-31T01:34:49.487810820Z" level=info msg="StartContainer for \"541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2\" returns successfully" Oct 31 01:34:50.380551 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:34:50.380655 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:34:51.116400 kubelet[2113]: I1031 01:34:51.116368 2113 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 01:34:51.125796 systemd[1]: run-containerd-runc-k8s.io-541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2-runc.4TQqQC.mount: Deactivated successfully. Oct 31 01:34:51.271534 kubelet[2113]: I1031 01:34:51.271469 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rjxbp" podStartSLOduration=2.864971722 podStartE2EDuration="23.270146216s" podCreationTimestamp="2025-10-31 01:34:28 +0000 UTC" firstStartedPulling="2025-10-31 01:34:28.842979128 +0000 UTC m=+18.600618919" lastFinishedPulling="2025-10-31 01:34:49.248153622 +0000 UTC m=+39.005793413" observedRunningTime="2025-10-31 01:34:49.595874079 +0000 UTC m=+39.353513880" watchObservedRunningTime="2025-10-31 01:34:51.270146216 +0000 UTC m=+41.027786011" Oct 31 01:34:51.272703 env[1250]: time="2025-10-31T01:34:51.272671304Z" level=info msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" Oct 31 01:34:51.299474 systemd[1]: run-containerd-runc-k8s.io-541fdd88eca2a2ec6c8c0e8bb9d399e7c98de24d7178bdabe1b689d229603bb2-runc.FINuIy.mount: Deactivated successfully. Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.561 [INFO][3287] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.561 [INFO][3287] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" iface="eth0" netns="/var/run/netns/cni-3068807f-4947-783b-50d8-db5d31955a4c" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.561 [INFO][3287] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" iface="eth0" netns="/var/run/netns/cni-3068807f-4947-783b-50d8-db5d31955a4c" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.562 [INFO][3287] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" iface="eth0" netns="/var/run/netns/cni-3068807f-4947-783b-50d8-db5d31955a4c" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.562 [INFO][3287] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:51.562 [INFO][3287] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.265 [INFO][3310] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.269 [INFO][3310] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.269 [INFO][3310] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.286 [WARNING][3310] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.286 [INFO][3310] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.287 [INFO][3310] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:52.290712 env[1250]: 2025-10-31 01:34:52.288 [INFO][3287] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:34:52.299685 env[1250]: time="2025-10-31T01:34:52.293781928Z" level=info msg="TearDown network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" successfully" Oct 31 01:34:52.299685 env[1250]: time="2025-10-31T01:34:52.293805480Z" level=info msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" returns successfully" Oct 31 01:34:52.292658 systemd[1]: run-netns-cni\x2d3068807f\x2d4947\x2d783b\x2d50d8\x2ddb5d31955a4c.mount: Deactivated successfully. Oct 31 01:34:52.352366 kubelet[2113]: I1031 01:34:52.352195 2113 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-backend-key-pair\") pod \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " Oct 31 01:34:52.352366 kubelet[2113]: I1031 01:34:52.352256 2113 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-ca-bundle\") pod \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " Oct 31 01:34:52.352366 kubelet[2113]: I1031 01:34:52.352281 2113 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-qwhnh\" (UniqueName: \"kubernetes.io/projected/1ebdd720-a8dd-405f-8dd3-22e46706aad8-kube-api-access-qwhnh\") pod \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\" (UID: \"1ebdd720-a8dd-405f-8dd3-22e46706aad8\") " Oct 31 01:34:52.392006 systemd[1]: var-lib-kubelet-pods-1ebdd720\x2da8dd\x2d405f\x2d8dd3\x2d22e46706aad8-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 31 01:34:52.394595 systemd[1]: var-lib-kubelet-pods-1ebdd720\x2da8dd\x2d405f\x2d8dd3\x2d22e46706aad8-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dqwhnh.mount: Deactivated successfully. Oct 31 01:34:52.399768 kubelet[2113]: I1031 01:34:52.396891 2113 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1ebdd720-a8dd-405f-8dd3-22e46706aad8-kube-api-access-qwhnh" (OuterVolumeSpecName: "kube-api-access-qwhnh") pod "1ebdd720-a8dd-405f-8dd3-22e46706aad8" (UID: "1ebdd720-a8dd-405f-8dd3-22e46706aad8"). InnerVolumeSpecName "kube-api-access-qwhnh". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 31 01:34:52.399920 kubelet[2113]: I1031 01:34:52.392968 2113 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "1ebdd720-a8dd-405f-8dd3-22e46706aad8" (UID: "1ebdd720-a8dd-405f-8dd3-22e46706aad8"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 31 01:34:52.400034 kubelet[2113]: I1031 01:34:52.399837 2113 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "1ebdd720-a8dd-405f-8dd3-22e46706aad8" (UID: "1ebdd720-a8dd-405f-8dd3-22e46706aad8"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 31 01:34:52.452759 kubelet[2113]: I1031 01:34:52.452725 2113 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" Oct 31 01:34:52.452759 kubelet[2113]: I1031 01:34:52.452752 2113 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1ebdd720-a8dd-405f-8dd3-22e46706aad8-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" Oct 31 01:34:52.452759 kubelet[2113]: I1031 01:34:52.452758 2113 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-qwhnh\" (UniqueName: \"kubernetes.io/projected/1ebdd720-a8dd-405f-8dd3-22e46706aad8-kube-api-access-qwhnh\") on node \"localhost\" DevicePath \"\"" Oct 31 01:34:52.472051 systemd[1]: Removed slice kubepods-besteffort-pod1ebdd720_a8dd_405f_8dd3_22e46706aad8.slice. Oct 31 01:34:52.662000 audit[3384]: AVC avc: denied { write } for pid=3384 comm="tee" name="fd" dev="proc" ino=36901 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.663000 audit[3389]: AVC avc: denied { write } for pid=3389 comm="tee" name="fd" dev="proc" ino=36663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.663000 audit[3389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff527a17ef a2=241 a3=1b6 items=1 ppid=3344 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.663000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:34:52.663000 audit: PATH item=0 name="/dev/fd/63" inode=36655 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.664000 audit[3382]: AVC avc: denied { write } for pid=3382 comm="tee" name="fd" dev="proc" ino=36902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.664000 audit[3382]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff56aa97dd a2=241 a3=1b6 items=1 ppid=3345 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.664000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:34:52.664000 audit: PATH item=0 name="/dev/fd/63" inode=36653 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.664000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.662000 audit[3384]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb54fa7de a2=241 a3=1b6 items=1 ppid=3342 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.662000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:34:52.662000 audit: PATH item=0 name="/dev/fd/63" inode=36654 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.662000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.665000 audit[3380]: AVC avc: denied { write } for pid=3380 comm="tee" name="fd" dev="proc" ino=36907 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.668000 audit[3395]: AVC avc: denied { write } for pid=3395 comm="tee" name="fd" dev="proc" ino=36669 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.668000 audit[3393]: AVC avc: denied { write } for pid=3393 comm="tee" name="fd" dev="proc" ino=36670 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.668000 audit[3395]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6442a7ed a2=241 a3=1b6 items=1 ppid=3334 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.668000 audit[3393]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf88a07ed a2=241 a3=1b6 items=1 ppid=3336 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.668000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:34:52.668000 audit: PATH item=0 name="/dev/fd/63" inode=36658 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.668000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:34:52.668000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.668000 audit: PATH item=0 name="/dev/fd/63" inode=36657 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.668000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.665000 audit[3380]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff943d47ed a2=241 a3=1b6 items=1 ppid=3339 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.665000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:34:52.665000 audit: PATH item=0 name="/dev/fd/63" inode=36652 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.665000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.678000 audit[3391]: AVC avc: denied { write } for pid=3391 comm="tee" name="fd" dev="proc" ino=36912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:34:52.678000 audit[3391]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0deb57ee a2=241 a3=1b6 items=1 ppid=3338 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:52.678000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:34:52.678000 audit: PATH item=0 name="/dev/fd/63" inode=36656 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:34:52.678000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:34:52.921369 systemd[1]: Created slice kubepods-besteffort-podebc6c587_4d46_47d9_896b_543e1944b1c1.slice. Oct 31 01:34:52.961780 kubelet[2113]: I1031 01:34:52.961751 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ebc6c587-4d46-47d9-896b-543e1944b1c1-whisker-backend-key-pair\") pod \"whisker-567f555684-zlgvm\" (UID: \"ebc6c587-4d46-47d9-896b-543e1944b1c1\") " pod="calico-system/whisker-567f555684-zlgvm" Oct 31 01:34:52.961780 kubelet[2113]: I1031 01:34:52.961780 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsj9t\" (UniqueName: \"kubernetes.io/projected/ebc6c587-4d46-47d9-896b-543e1944b1c1-kube-api-access-vsj9t\") pod \"whisker-567f555684-zlgvm\" (UID: \"ebc6c587-4d46-47d9-896b-543e1944b1c1\") " pod="calico-system/whisker-567f555684-zlgvm" Oct 31 01:34:52.961939 kubelet[2113]: I1031 01:34:52.961794 2113 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ebc6c587-4d46-47d9-896b-543e1944b1c1-whisker-ca-bundle\") pod \"whisker-567f555684-zlgvm\" (UID: \"ebc6c587-4d46-47d9-896b-543e1944b1c1\") " pod="calico-system/whisker-567f555684-zlgvm" Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.519000 audit: BPF prog-id=136 op=LOAD Oct 31 01:34:53.519000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea95380a0 a2=98 a3=1fffffffffffffff items=0 ppid=3337 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.519000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:34:53.519000 audit: BPF prog-id=136 op=UNLOAD Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit: BPF prog-id=137 op=LOAD Oct 31 01:34:53.555000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea9537f80 a2=94 a3=3 items=0 ppid=3337 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.555000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:34:53.555000 audit: BPF prog-id=137 op=UNLOAD Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit: BPF prog-id=138 op=LOAD Oct 31 01:34:53.555000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea9537fc0 a2=94 a3=7ffea95381a0 items=0 ppid=3337 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.555000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:34:53.555000 audit: BPF prog-id=138 op=UNLOAD Oct 31 01:34:53.555000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.555000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffea9538090 a2=50 a3=a000000085 items=0 ppid=3337 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.555000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:34:53.619878 env[1250]: time="2025-10-31T01:34:53.542385953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-567f555684-zlgvm,Uid:ebc6c587-4d46-47d9-896b-543e1944b1c1,Namespace:calico-system,Attempt:0,}" Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.637000 audit: BPF prog-id=139 op=LOAD Oct 31 01:34:53.637000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc14841750 a2=98 a3=3 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.637000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.637000 audit: BPF prog-id=139 op=UNLOAD Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit: BPF prog-id=140 op=LOAD Oct 31 01:34:53.648000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc14841540 a2=94 a3=54428f items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.648000 audit: BPF prog-id=140 op=UNLOAD Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.648000 audit: BPF prog-id=141 op=LOAD Oct 31 01:34:53.648000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc14841570 a2=94 a3=2 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.648000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.648000 audit: BPF prog-id=141 op=UNLOAD Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.721000 audit: BPF prog-id=142 op=LOAD Oct 31 01:34:53.721000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc14841430 a2=94 a3=1 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.721000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.721000 audit: BPF prog-id=142 op=UNLOAD Oct 31 01:34:53.722000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.722000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc14841500 a2=50 a3=7ffc148415e0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.722000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc14841440 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc14841470 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc14841380 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc14841490 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc14841470 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc14841460 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc14841490 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc14841470 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc14841490 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc14841460 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc148414d0 a2=28 a3=0 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc14841280 a2=50 a3=1 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit: BPF prog-id=143 op=LOAD Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc14841280 a2=94 a3=5 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit: BPF prog-id=143 op=UNLOAD Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc14841330 a2=50 a3=1 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc14841450 a2=4 a3=38 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { confidentiality } for pid=3449 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc148414a0 a2=94 a3=6 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { confidentiality } for pid=3449 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc14840c50 a2=94 a3=88 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.733000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc14840c50 a2=94 a3=88 items=0 ppid=3337 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.762000 audit: BPF prog-id=144 op=LOAD Oct 31 01:34:53.762000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef7928050 a2=98 a3=1999999999999999 items=0 ppid=3337 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.762000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:34:53.763000 audit: BPF prog-id=144 op=UNLOAD Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit: BPF prog-id=145 op=LOAD Oct 31 01:34:53.763000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef7927f30 a2=94 a3=ffff items=0 ppid=3337 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.763000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:34:53.763000 audit: BPF prog-id=145 op=UNLOAD Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.763000 audit: BPF prog-id=146 op=LOAD Oct 31 01:34:53.763000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef7927f70 a2=94 a3=7ffef7928150 items=0 ppid=3337 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.763000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:34:53.763000 audit: BPF prog-id=146 op=UNLOAD Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.900000 audit: BPF prog-id=147 op=LOAD Oct 31 01:34:53.900000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebe3b30 a2=98 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.900000 audit: BPF prog-id=147 op=UNLOAD Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit: BPF prog-id=148 op=LOAD Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebe3940 a2=94 a3=54428f items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit: BPF prog-id=148 op=UNLOAD Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit: BPF prog-id=149 op=LOAD Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebe3970 a2=94 a3=2 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit: BPF prog-id=149 op=UNLOAD Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe3840 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ebe3870 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ebe3780 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe3890 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe3870 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe3860 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe3890 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ebe3870 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ebe3890 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5ebe3860 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5ebe38d0 a2=28 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit: BPF prog-id=150 op=LOAD Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ebe3740 a2=94 a3=0 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit: BPF prog-id=150 op=UNLOAD Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff5ebe3730 a2=50 a3=2800 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff5ebe3730 a2=50 a3=2800 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit: BPF prog-id=151 op=LOAD Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ebe2f50 a2=94 a3=2 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.906000 audit: BPF prog-id=151 op=UNLOAD Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.906000 audit: BPF prog-id=152 op=LOAD Oct 31 01:34:53.906000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5ebe3050 a2=94 a3=30 items=0 ppid=3337 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.909000 audit: BPF prog-id=153 op=LOAD Oct 31 01:34:53.909000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb5dbaf50 a2=98 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.909000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:53.909000 audit: BPF prog-id=153 op=UNLOAD Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit: BPF prog-id=154 op=LOAD Oct 31 01:34:53.910000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5dbad40 a2=94 a3=54428f items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.910000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:53.910000 audit: BPF prog-id=154 op=UNLOAD Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:53.910000 audit: BPF prog-id=155 op=LOAD Oct 31 01:34:53.910000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5dbad70 a2=94 a3=2 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:53.910000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:53.910000 audit: BPF prog-id=155 op=UNLOAD Oct 31 01:34:53.902257 systemd-networkd[1064]: vxlan.calico: Link UP Oct 31 01:34:53.902260 systemd-networkd[1064]: vxlan.calico: Gained carrier Oct 31 01:34:54.001689 systemd-networkd[1064]: cali3e8b4436c7e: Link UP Oct 31 01:34:54.002086 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e8b4436c7e: link becomes ready Oct 31 01:34:54.001840 systemd-networkd[1064]: cali3e8b4436c7e: Gained carrier Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.800 [INFO][3455] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--567f555684--zlgvm-eth0 whisker-567f555684- calico-system ebc6c587-4d46-47d9-896b-543e1944b1c1 901 0 2025-10-31 01:34:52 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:567f555684 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-567f555684-zlgvm eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali3e8b4436c7e [] [] }} ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.800 [INFO][3455] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.847 [INFO][3479] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" HandleID="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Workload="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.847 [INFO][3479] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" HandleID="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Workload="localhost-k8s-whisker--567f555684--zlgvm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251120), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-567f555684-zlgvm", "timestamp":"2025-10-31 01:34:53.847886579 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.848 [INFO][3479] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.848 [INFO][3479] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.848 [INFO][3479] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.885 [INFO][3479] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.952 [INFO][3479] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.957 [INFO][3479] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.961 [INFO][3479] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.964 [INFO][3479] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.964 [INFO][3479] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.966 [INFO][3479] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1 Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.971 [INFO][3479] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.982 [INFO][3479] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.982 [INFO][3479] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" host="localhost" Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.982 [INFO][3479] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:54.038900 env[1250]: 2025-10-31 01:34:53.982 [INFO][3479] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" HandleID="k8s-pod-network.ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Workload="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit: BPF prog-id=156 op=LOAD Oct 31 01:34:54.038000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb5dbac30 a2=94 a3=1 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.038000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.038000 audit: BPF prog-id=156 op=UNLOAD Oct 31 01:34:54.038000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.038000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb5dbad00 a2=50 a3=7fffb5dbade0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.038000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:53.984 [INFO][3455] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--567f555684--zlgvm-eth0", GenerateName:"whisker-567f555684-", Namespace:"calico-system", SelfLink:"", UID:"ebc6c587-4d46-47d9-896b-543e1944b1c1", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"567f555684", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-567f555684-zlgvm", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali3e8b4436c7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:53.985 [INFO][3455] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:53.985 [INFO][3455] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e8b4436c7e ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:54.004 [INFO][3455] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:54.004 [INFO][3455] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--567f555684--zlgvm-eth0", GenerateName:"whisker-567f555684-", Namespace:"calico-system", SelfLink:"", UID:"ebc6c587-4d46-47d9-896b-543e1944b1c1", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"567f555684", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1", Pod:"whisker-567f555684-zlgvm", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali3e8b4436c7e", MAC:"9a:5a:9f:71:bc:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:54.050409 env[1250]: 2025-10-31 01:34:54.036 [INFO][3455] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1" Namespace="calico-system" Pod="whisker-567f555684-zlgvm" WorkloadEndpoint="localhost-k8s-whisker--567f555684--zlgvm-eth0" Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbac40 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5dbac70 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5dbab80 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbac90 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbac70 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbac60 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbac90 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5dbac70 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5dbac90 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb5dbac60 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb5dbacd0 a2=28 a3=0 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb5dbaa80 a2=50 a3=1 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit: BPF prog-id=157 op=LOAD Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb5dbaa80 a2=94 a3=5 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.051000 audit: BPF prog-id=157 op=UNLOAD Oct 31 01:34:54.051000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.051000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb5dbab30 a2=50 a3=1 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb5dbac50 a2=4 a3=38 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { confidentiality } for pid=3504 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb5dbaca0 a2=94 a3=6 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { confidentiality } for pid=3504 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb5dba450 a2=94 a3=88 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { perfmon } for pid=3504 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { confidentiality } for pid=3504 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb5dba450 a2=94 a3=88 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5dbbe80 a2=10 a3=f8f00800 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5dbbd20 a2=10 a3=3 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5dbbcc0 a2=10 a3=3 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.052000 audit[3504]: AVC avc: denied { bpf } for pid=3504 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.052000 audit[3504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb5dbbcc0 a2=10 a3=7 items=0 ppid=3337 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:34:54.063000 audit: BPF prog-id=152 op=UNLOAD Oct 31 01:34:54.075522 env[1250]: time="2025-10-31T01:34:54.075335752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:54.075522 env[1250]: time="2025-10-31T01:34:54.075363015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:54.075522 env[1250]: time="2025-10-31T01:34:54.075373860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:54.075522 env[1250]: time="2025-10-31T01:34:54.075478279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1 pid=3524 runtime=io.containerd.runc.v2 Oct 31 01:34:54.122183 systemd[1]: Started cri-containerd-ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1.scope. Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.136000 audit: BPF prog-id=158 op=LOAD Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3524 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343164306633353334336464383862643164383666653266313330 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3524 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343164306633353334336464383862643164383666653266313330 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit: BPF prog-id=159 op=LOAD Oct 31 01:34:54.137000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000329910 items=0 ppid=3524 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343164306633353334336464383862643164383666653266313330 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit: BPF prog-id=160 op=LOAD Oct 31 01:34:54.137000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000329958 items=0 ppid=3524 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343164306633353334336464383862643164383666653266313330 Oct 31 01:34:54.137000 audit: BPF prog-id=160 op=UNLOAD Oct 31 01:34:54.137000 audit: BPF prog-id=159 op=UNLOAD Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:54.137000 audit: BPF prog-id=161 op=LOAD Oct 31 01:34:54.137000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000329d68 items=0 ppid=3524 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343164306633353334336464383862643164383666653266313330 Oct 31 01:34:54.139822 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:54.215291 env[1250]: time="2025-10-31T01:34:54.215259545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-567f555684-zlgvm,Uid:ebc6c587-4d46-47d9-896b-543e1944b1c1,Namespace:calico-system,Attempt:0,} returns sandbox id \"ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1\"" Oct 31 01:34:54.239000 audit[3589]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=3589 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:54.239000 audit[3589]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcd9e009e0 a2=0 a3=7ffcd9e009cc items=0 ppid=3337 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.239000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:54.258000 audit[3587]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=3587 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:54.258000 audit[3587]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff51588c30 a2=0 a3=7fff51588c1c items=0 ppid=3337 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:54.262000 audit[3586]: NETFILTER_CFG table=raw:105 family=2 entries=21 op=nft_register_chain pid=3586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:54.262000 audit[3586]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe34eca340 a2=0 a3=7ffe34eca32c items=0 ppid=3337 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.262000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:54.265305 env[1250]: time="2025-10-31T01:34:54.265127525Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:34:54.265000 audit[3588]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=3588 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:54.265000 audit[3588]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff1a44a600 a2=0 a3=7fff1a44a5ec items=0 ppid=3337 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:54.311000 audit[3599]: NETFILTER_CFG table=filter:107 family=2 entries=59 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:54.311000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=35860 a0=3 a1=7ffc9ff1f860 a2=0 a3=7ffc9ff1f84c items=0 ppid=3337 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:54.311000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:54.419777 systemd[1]: run-containerd-runc-k8s.io-ba41d0f35343dd88bd1d86fe2f130b517a17f803523147c7a2991b54a8dad3d1-runc.5oxcEb.mount: Deactivated successfully. Oct 31 01:34:54.431907 kubelet[2113]: I1031 01:34:54.431862 2113 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="1ebdd720-a8dd-405f-8dd3-22e46706aad8" path="/var/lib/kubelet/pods/1ebdd720-a8dd-405f-8dd3-22e46706aad8/volumes" Oct 31 01:34:54.623098 env[1250]: time="2025-10-31T01:34:54.623059733Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:54.626448 env[1250]: time="2025-10-31T01:34:54.626378750Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:34:54.651498 kubelet[2113]: E1031 01:34:54.641193 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:34:54.651712 kubelet[2113]: E1031 01:34:54.651690 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:34:54.747690 kubelet[2113]: E1031 01:34:54.747590 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:6cba03db46bf4c90b2541965f6c92e10,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:54.749933 env[1250]: time="2025-10-31T01:34:54.749901983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:34:55.051119 systemd-networkd[1064]: vxlan.calico: Gained IPv6LL Oct 31 01:34:55.075015 env[1250]: time="2025-10-31T01:34:55.074970889Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:55.076702 env[1250]: time="2025-10-31T01:34:55.076659705Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:34:55.076891 kubelet[2113]: E1031 01:34:55.076853 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:34:55.076985 kubelet[2113]: E1031 01:34:55.076896 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:34:55.077080 kubelet[2113]: E1031 01:34:55.077015 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:55.078341 kubelet[2113]: E1031 01:34:55.078295 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:34:55.598246 kubelet[2113]: E1031 01:34:55.598204 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:34:55.737071 kernel: kauditd_printk_skb: 656 callbacks suppressed Oct 31 01:34:55.737217 kernel: audit: type=1325 audit(1761874495.731:1110): table=filter:108 family=2 entries=20 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:55.737279 kernel: audit: type=1300 audit(1761874495.731:1110): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcb4c14c60 a2=0 a3=7ffcb4c14c4c items=0 ppid=2217 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:55.731000 audit[3607]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:55.731000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcb4c14c60 a2=0 a3=7ffcb4c14c4c items=0 ppid=2217 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:55.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:55.741403 kernel: audit: type=1327 audit(1761874495.731:1110): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:55.742000 audit[3607]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:55.742000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb4c14c60 a2=0 a3=0 items=0 ppid=2217 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:55.748319 kernel: audit: type=1325 audit(1761874495.742:1111): table=nat:109 family=2 entries=14 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:55.748422 kernel: audit: type=1300 audit(1761874495.742:1111): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb4c14c60 a2=0 a3=0 items=0 ppid=2217 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:55.748456 kernel: audit: type=1327 audit(1761874495.742:1111): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:55.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:55.947183 systemd-networkd[1064]: cali3e8b4436c7e: Gained IPv6LL Oct 31 01:34:56.415276 env[1250]: time="2025-10-31T01:34:56.415229820Z" level=info msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" iface="eth0" netns="/var/run/netns/cni-2d767c0c-9fa8-3ff7-dc1c-8f0de48dbe06" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" iface="eth0" netns="/var/run/netns/cni-2d767c0c-9fa8-3ff7-dc1c-8f0de48dbe06" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" iface="eth0" netns="/var/run/netns/cni-2d767c0c-9fa8-3ff7-dc1c-8f0de48dbe06" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.462 [INFO][3618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.489 [INFO][3625] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.489 [INFO][3625] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.489 [INFO][3625] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.494 [WARNING][3625] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.494 [INFO][3625] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.496 [INFO][3625] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:56.499241 env[1250]: 2025-10-31 01:34:56.497 [INFO][3618] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:34:56.501363 systemd[1]: run-netns-cni\x2d2d767c0c\x2d9fa8\x2d3ff7\x2ddc1c\x2d8f0de48dbe06.mount: Deactivated successfully. Oct 31 01:34:56.502434 env[1250]: time="2025-10-31T01:34:56.502408792Z" level=info msg="TearDown network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" successfully" Oct 31 01:34:56.502495 env[1250]: time="2025-10-31T01:34:56.502482782Z" level=info msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" returns successfully" Oct 31 01:34:56.503152 env[1250]: time="2025-10-31T01:34:56.503121767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-rxdv6,Uid:219495e8-c37f-4fb2-a42b-662657c7b41b,Namespace:calico-apiserver,Attempt:1,}" Oct 31 01:34:56.623578 systemd-networkd[1064]: cali9a8bca362bf: Link UP Oct 31 01:34:56.629381 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:34:56.630173 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a8bca362bf: link becomes ready Oct 31 01:34:56.629751 systemd-networkd[1064]: cali9a8bca362bf: Gained carrier Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.560 [INFO][3631] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0 calico-apiserver-7cd95f4479- calico-apiserver 219495e8-c37f-4fb2-a42b-662657c7b41b 926 0 2025-10-31 01:34:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7cd95f4479 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7cd95f4479-rxdv6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9a8bca362bf [] [] }} ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.560 [INFO][3631] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.594 [INFO][3643] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" HandleID="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.594 [INFO][3643] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" HandleID="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd800), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7cd95f4479-rxdv6", "timestamp":"2025-10-31 01:34:56.594824138 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.595 [INFO][3643] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.595 [INFO][3643] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.595 [INFO][3643] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.601 [INFO][3643] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.603 [INFO][3643] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.607 [INFO][3643] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.607 [INFO][3643] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.608 [INFO][3643] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.608 [INFO][3643] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.609 [INFO][3643] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.612 [INFO][3643] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.616 [INFO][3643] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.616 [INFO][3643] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" host="localhost" Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.616 [INFO][3643] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:56.645996 env[1250]: 2025-10-31 01:34:56.616 [INFO][3643] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" HandleID="k8s-pod-network.fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.619 [INFO][3631] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"219495e8-c37f-4fb2-a42b-662657c7b41b", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7cd95f4479-rxdv6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a8bca362bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.619 [INFO][3631] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.619 [INFO][3631] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9a8bca362bf ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.633 [INFO][3631] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.636 [INFO][3631] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"219495e8-c37f-4fb2-a42b-662657c7b41b", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a", Pod:"calico-apiserver-7cd95f4479-rxdv6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a8bca362bf", MAC:"7a:8f:1a:e6:54:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:56.647197 env[1250]: 2025-10-31 01:34:56.644 [INFO][3631] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-rxdv6" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:34:56.657246 env[1250]: time="2025-10-31T01:34:56.657182435Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:56.657444 env[1250]: time="2025-10-31T01:34:56.657427943Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:56.657516 env[1250]: time="2025-10-31T01:34:56.657502648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:56.657683 env[1250]: time="2025-10-31T01:34:56.657665383Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a pid=3666 runtime=io.containerd.runc.v2 Oct 31 01:34:56.684935 systemd[1]: Started cri-containerd-fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a.scope. Oct 31 01:34:56.701153 kernel: audit: type=1400 audit(1761874496.695:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.701220 kernel: audit: type=1400 audit(1761874496.695:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.706706 kernel: audit: type=1400 audit(1761874496.695:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.706739 kernel: audit: type=1400 audit(1761874496.695:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.700000 audit: BPF prog-id=162 op=LOAD Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3666 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393563393863656638386566623534303363663362656531363864 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3666 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393563393863656638386566623534303363663362656531363864 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit: BPF prog-id=163 op=LOAD Oct 31 01:34:56.702000 audit[3677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000220350 items=0 ppid=3666 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393563393863656638386566623534303363663362656531363864 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.702000 audit: BPF prog-id=164 op=LOAD Oct 31 01:34:56.702000 audit[3677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000220398 items=0 ppid=3666 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393563393863656638386566623534303363663362656531363864 Oct 31 01:34:56.703000 audit: BPF prog-id=164 op=UNLOAD Oct 31 01:34:56.703000 audit: BPF prog-id=163 op=UNLOAD Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:56.703000 audit: BPF prog-id=165 op=LOAD Oct 31 01:34:56.703000 audit[3677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0002207a8 items=0 ppid=3666 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393563393863656638386566623534303363663362656531363864 Oct 31 01:34:56.707094 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:56.731844 env[1250]: time="2025-10-31T01:34:56.731429909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-rxdv6,Uid:219495e8-c37f-4fb2-a42b-662657c7b41b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a\"" Oct 31 01:34:56.732760 env[1250]: time="2025-10-31T01:34:56.732654716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:34:56.737000 audit[3700]: NETFILTER_CFG table=filter:110 family=2 entries=50 op=nft_register_chain pid=3700 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:56.737000 audit[3700]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffcb0b58080 a2=0 a3=7ffcb0b5806c items=0 ppid=3337 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:56.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:57.048215 env[1250]: time="2025-10-31T01:34:57.048111471Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:57.049069 env[1250]: time="2025-10-31T01:34:57.049008384Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:34:57.049477 kubelet[2113]: E1031 01:34:57.049422 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:34:57.049477 kubelet[2113]: E1031 01:34:57.049456 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:34:57.049736 kubelet[2113]: E1031 01:34:57.049565 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-76z8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:57.051004 kubelet[2113]: E1031 01:34:57.050937 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:34:57.415837 env[1250]: time="2025-10-31T01:34:57.415810690Z" level=info msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" Oct 31 01:34:57.416183 env[1250]: time="2025-10-31T01:34:57.416010669Z" level=info msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.550 [INFO][3722] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.550 [INFO][3722] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" iface="eth0" netns="/var/run/netns/cni-3766cd87-88ad-3a7d-f233-9027e1673bd0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.550 [INFO][3722] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" iface="eth0" netns="/var/run/netns/cni-3766cd87-88ad-3a7d-f233-9027e1673bd0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.553 [INFO][3722] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" iface="eth0" netns="/var/run/netns/cni-3766cd87-88ad-3a7d-f233-9027e1673bd0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.553 [INFO][3722] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.553 [INFO][3722] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.592 [INFO][3735] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.593 [INFO][3735] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.593 [INFO][3735] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.597 [WARNING][3735] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.597 [INFO][3735] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.598 [INFO][3735] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:57.607528 env[1250]: 2025-10-31 01:34:57.599 [INFO][3722] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:34:57.614970 env[1250]: time="2025-10-31T01:34:57.610512198Z" level=info msg="TearDown network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" successfully" Oct 31 01:34:57.614970 env[1250]: time="2025-10-31T01:34:57.610564680Z" level=info msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" returns successfully" Oct 31 01:34:57.614970 env[1250]: time="2025-10-31T01:34:57.611480014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c968f69f7-xxxq9,Uid:5edf9cae-9eb4-43f9-9dfa-cdffa758deb5,Namespace:calico-system,Attempt:1,}" Oct 31 01:34:57.615056 kubelet[2113]: E1031 01:34:57.612428 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:34:57.610503 systemd[1]: run-netns-cni\x2d3766cd87\x2d88ad\x2d3a7d\x2df233\x2d9027e1673bd0.mount: Deactivated successfully. Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.560 [INFO][3723] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.560 [INFO][3723] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" iface="eth0" netns="/var/run/netns/cni-3eea2392-881a-9dde-431b-26757487d35a" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.561 [INFO][3723] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" iface="eth0" netns="/var/run/netns/cni-3eea2392-881a-9dde-431b-26757487d35a" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.561 [INFO][3723] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" iface="eth0" netns="/var/run/netns/cni-3eea2392-881a-9dde-431b-26757487d35a" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.561 [INFO][3723] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.561 [INFO][3723] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.606 [INFO][3741] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.606 [INFO][3741] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.606 [INFO][3741] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.619 [WARNING][3741] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.619 [INFO][3741] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.626 [INFO][3741] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:57.628811 env[1250]: 2025-10-31 01:34:57.627 [INFO][3723] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:34:57.630849 systemd[1]: run-netns-cni\x2d3eea2392\x2d881a\x2d9dde\x2d431b\x2d26757487d35a.mount: Deactivated successfully. Oct 31 01:34:57.635799 env[1250]: time="2025-10-31T01:34:57.631436828Z" level=info msg="TearDown network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" successfully" Oct 31 01:34:57.635799 env[1250]: time="2025-10-31T01:34:57.631465195Z" level=info msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" returns successfully" Oct 31 01:34:57.635799 env[1250]: time="2025-10-31T01:34:57.632675504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hszfb,Uid:47a38da1-fd15-4cb6-9f0a-aefa44fb658a,Namespace:calico-system,Attempt:1,}" Oct 31 01:34:57.705000 audit[3773]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:57.705000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd9cce1b50 a2=0 a3=7ffd9cce1b3c items=0 ppid=2217 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:57.717000 audit[3773]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:57.717000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd9cce1b50 a2=0 a3=0 items=0 ppid=2217 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:57.880332 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:34:57.880420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali92390d75924: link becomes ready Oct 31 01:34:57.885718 systemd-networkd[1064]: cali92390d75924: Link UP Oct 31 01:34:57.885933 systemd-networkd[1064]: cali92390d75924: Gained carrier Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.686 [INFO][3749] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0 calico-kube-controllers-c968f69f7- calico-system 5edf9cae-9eb4-43f9-9dfa-cdffa758deb5 937 0 2025-10-31 01:34:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c968f69f7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-c968f69f7-xxxq9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali92390d75924 [] [] }} ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.686 [INFO][3749] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.719 [INFO][3776] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" HandleID="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.719 [INFO][3776] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" HandleID="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000250f50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-c968f69f7-xxxq9", "timestamp":"2025-10-31 01:34:57.71916573 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.719 [INFO][3776] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.719 [INFO][3776] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.719 [INFO][3776] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.726 [INFO][3776] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.731 [INFO][3776] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.736 [INFO][3776] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.737 [INFO][3776] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.739 [INFO][3776] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.739 [INFO][3776] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.742 [INFO][3776] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476 Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.748 [INFO][3776] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.874 [INFO][3776] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.874 [INFO][3776] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" host="localhost" Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.874 [INFO][3776] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:57.907361 env[1250]: 2025-10-31 01:34:57.874 [INFO][3776] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" HandleID="k8s-pod-network.f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.876 [INFO][3749] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0", GenerateName:"calico-kube-controllers-c968f69f7-", Namespace:"calico-system", SelfLink:"", UID:"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c968f69f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-c968f69f7-xxxq9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92390d75924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.876 [INFO][3749] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.876 [INFO][3749] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali92390d75924 ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.887 [INFO][3749] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.888 [INFO][3749] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0", GenerateName:"calico-kube-controllers-c968f69f7-", Namespace:"calico-system", SelfLink:"", UID:"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c968f69f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476", Pod:"calico-kube-controllers-c968f69f7-xxxq9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92390d75924", MAC:"a6:f5:75:30:9c:12", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:57.907855 env[1250]: 2025-10-31 01:34:57.905 [INFO][3749] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476" Namespace="calico-system" Pod="calico-kube-controllers-c968f69f7-xxxq9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:34:57.931000 audit[3798]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:57.931000 audit[3798]: SYSCALL arch=c000003e syscall=46 success=yes exit=23616 a0=3 a1=7ffe71196470 a2=0 a3=7ffe7119645c items=0 ppid=3337 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:57.938728 env[1250]: time="2025-10-31T01:34:57.938686923Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:57.938835 env[1250]: time="2025-10-31T01:34:57.938765499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:57.938835 env[1250]: time="2025-10-31T01:34:57.938783003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:57.938902 env[1250]: time="2025-10-31T01:34:57.938878941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476 pid=3805 runtime=io.containerd.runc.v2 Oct 31 01:34:57.960390 systemd[1]: Started cri-containerd-f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476.scope. Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.970000 audit: BPF prog-id=166 op=LOAD Oct 31 01:34:57.970000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.970000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3805 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626233336632393338363761353731623037313462343463623364 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3805 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626233336632393338363761353731623037313462343463623364 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit: BPF prog-id=167 op=LOAD Oct 31 01:34:57.971000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009cd20 items=0 ppid=3805 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626233336632393338363761353731623037313462343463623364 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.971000 audit: BPF prog-id=168 op=LOAD Oct 31 01:34:57.971000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009cd68 items=0 ppid=3805 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626233336632393338363761353731623037313462343463623364 Oct 31 01:34:57.972000 audit: BPF prog-id=168 op=UNLOAD Oct 31 01:34:57.972000 audit: BPF prog-id=167 op=UNLOAD Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:57.972000 audit: BPF prog-id=169 op=LOAD Oct 31 01:34:57.972000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009d178 items=0 ppid=3805 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:57.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633626233336632393338363761353731623037313462343463623364 Oct 31 01:34:57.974157 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:57.987443 systemd-networkd[1064]: cali8ee644ba214: Link UP Oct 31 01:34:57.989245 systemd-networkd[1064]: cali8ee644ba214: Gained carrier Oct 31 01:34:57.990174 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ee644ba214: link becomes ready Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.704 [INFO][3754] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--hszfb-eth0 csi-node-driver- calico-system 47a38da1-fd15-4cb6-9f0a-aefa44fb658a 938 0 2025-10-31 01:34:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-hszfb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali8ee644ba214 [] [] }} ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.704 [INFO][3754] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.733 [INFO][3781] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" HandleID="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.733 [INFO][3781] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" HandleID="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251180), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-hszfb", "timestamp":"2025-10-31 01:34:57.733364016 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.733 [INFO][3781] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.874 [INFO][3781] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.874 [INFO][3781] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.908 [INFO][3781] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.916 [INFO][3781] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.921 [INFO][3781] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.930 [INFO][3781] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.933 [INFO][3781] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.933 [INFO][3781] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.935 [INFO][3781] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.950 [INFO][3781] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.984 [INFO][3781] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.984 [INFO][3781] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" host="localhost" Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.984 [INFO][3781] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:58.007955 env[1250]: 2025-10-31 01:34:57.984 [INFO][3781] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" HandleID="k8s-pod-network.bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:57.985 [INFO][3754] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hszfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47a38da1-fd15-4cb6-9f0a-aefa44fb658a", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-hszfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8ee644ba214", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:57.985 [INFO][3754] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:57.985 [INFO][3754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8ee644ba214 ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:57.990 [INFO][3754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:57.990 [INFO][3754] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hszfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47a38da1-fd15-4cb6-9f0a-aefa44fb658a", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd", Pod:"csi-node-driver-hszfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8ee644ba214", MAC:"42:3d:06:9d:e6:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:58.008506 env[1250]: 2025-10-31 01:34:58.004 [INFO][3754] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd" Namespace="calico-system" Pod="csi-node-driver-hszfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:34:58.017000 audit[3839]: NETFILTER_CFG table=filter:114 family=2 entries=40 op=nft_register_chain pid=3839 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:58.017000 audit[3839]: SYSCALL arch=c000003e syscall=46 success=yes exit=20748 a0=3 a1=7fff7e074540 a2=0 a3=7fff7e07452c items=0 ppid=3337 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.017000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:58.025261 env[1250]: time="2025-10-31T01:34:58.025203841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c968f69f7-xxxq9,Uid:5edf9cae-9eb4-43f9-9dfa-cdffa758deb5,Namespace:calico-system,Attempt:1,} returns sandbox id \"f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476\"" Oct 31 01:34:58.028380 env[1250]: time="2025-10-31T01:34:58.026626359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:34:58.039810 env[1250]: time="2025-10-31T01:34:58.039571247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:58.039810 env[1250]: time="2025-10-31T01:34:58.039629930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:58.039810 env[1250]: time="2025-10-31T01:34:58.039645010Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:58.041217 env[1250]: time="2025-10-31T01:34:58.041153792Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd pid=3856 runtime=io.containerd.runc.v2 Oct 31 01:34:58.058990 systemd[1]: Started cri-containerd-bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd.scope. Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.071000 audit: BPF prog-id=170 op=LOAD Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3856 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343631373531633039346166373938623264353034313939656630 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3856 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343631373531633039346166373938623264353034313939656630 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit: BPF prog-id=171 op=LOAD Oct 31 01:34:58.072000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00032acb0 items=0 ppid=3856 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343631373531633039346166373938623264353034313939656630 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit: BPF prog-id=172 op=LOAD Oct 31 01:34:58.072000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00032acf8 items=0 ppid=3856 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343631373531633039346166373938623264353034313939656630 Oct 31 01:34:58.072000 audit: BPF prog-id=172 op=UNLOAD Oct 31 01:34:58.072000 audit: BPF prog-id=171 op=UNLOAD Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.072000 audit: BPF prog-id=173 op=LOAD Oct 31 01:34:58.072000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00032b108 items=0 ppid=3856 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343631373531633039346166373938623264353034313939656630 Oct 31 01:34:58.073852 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:58.217201 env[1250]: time="2025-10-31T01:34:58.082530078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hszfb,Uid:47a38da1-fd15-4cb6-9f0a-aefa44fb658a,Namespace:calico-system,Attempt:1,} returns sandbox id \"bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd\"" Oct 31 01:34:58.123185 systemd-networkd[1064]: cali9a8bca362bf: Gained IPv6LL Oct 31 01:34:58.372734 env[1250]: time="2025-10-31T01:34:58.372697197Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:58.373596 env[1250]: time="2025-10-31T01:34:58.373563783Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:34:58.374546 kubelet[2113]: E1031 01:34:58.373837 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:34:58.374546 kubelet[2113]: E1031 01:34:58.373877 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:34:58.374546 kubelet[2113]: E1031 01:34:58.374080 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8tj2g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:58.375119 env[1250]: time="2025-10-31T01:34:58.374379092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:34:58.375415 kubelet[2113]: E1031 01:34:58.375379 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:34:58.416356 env[1250]: time="2025-10-31T01:34:58.416327340Z" level=info msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.488 [INFO][3899] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.488 [INFO][3899] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" iface="eth0" netns="/var/run/netns/cni-44e4d887-13b5-b3e1-635b-93fe82f2e9a1" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.489 [INFO][3899] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" iface="eth0" netns="/var/run/netns/cni-44e4d887-13b5-b3e1-635b-93fe82f2e9a1" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.491 [INFO][3899] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" iface="eth0" netns="/var/run/netns/cni-44e4d887-13b5-b3e1-635b-93fe82f2e9a1" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.491 [INFO][3899] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.491 [INFO][3899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.506 [INFO][3907] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.506 [INFO][3907] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.506 [INFO][3907] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.510 [WARNING][3907] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.510 [INFO][3907] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.511 [INFO][3907] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:58.514440 env[1250]: 2025-10-31 01:34:58.512 [INFO][3899] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:34:58.514945 env[1250]: time="2025-10-31T01:34:58.514922167Z" level=info msg="TearDown network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" successfully" Oct 31 01:34:58.515003 env[1250]: time="2025-10-31T01:34:58.514989773Z" level=info msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" returns successfully" Oct 31 01:34:58.515650 env[1250]: time="2025-10-31T01:34:58.515635650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-rhh92,Uid:baface2f-bddc-4c4d-8b58-0007db010995,Namespace:kube-system,Attempt:1,}" Oct 31 01:34:58.611904 systemd[1]: run-netns-cni\x2d44e4d887\x2d13b5\x2db3e1\x2d635b\x2d93fe82f2e9a1.mount: Deactivated successfully. Oct 31 01:34:58.615788 kubelet[2113]: E1031 01:34:58.615665 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:34:58.616942 kubelet[2113]: E1031 01:34:58.616779 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:34:58.680667 env[1250]: time="2025-10-31T01:34:58.680638105Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:58.719233 env[1250]: time="2025-10-31T01:34:58.719163436Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:34:58.720445 kubelet[2113]: E1031 01:34:58.720299 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:34:58.720445 kubelet[2113]: E1031 01:34:58.720328 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:34:58.720445 kubelet[2113]: E1031 01:34:58.720407 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:58.721993 env[1250]: time="2025-10-31T01:34:58.721977022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:34:58.818651 systemd-networkd[1064]: calia03a2aea51b: Link UP Oct 31 01:34:58.819278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia03a2aea51b: link becomes ready Oct 31 01:34:58.818804 systemd-networkd[1064]: calia03a2aea51b: Gained carrier Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.572 [INFO][3913] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--rhh92-eth0 coredns-674b8bbfcf- kube-system baface2f-bddc-4c4d-8b58-0007db010995 959 0 2025-10-31 01:34:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-rhh92 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia03a2aea51b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.572 [INFO][3913] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.590 [INFO][3926] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" HandleID="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.590 [INFO][3926] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" HandleID="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002518b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-rhh92", "timestamp":"2025-10-31 01:34:58.590197862 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.590 [INFO][3926] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.590 [INFO][3926] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.590 [INFO][3926] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.678 [INFO][3926] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.760 [INFO][3926] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.770 [INFO][3926] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.781 [INFO][3926] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.799 [INFO][3926] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.799 [INFO][3926] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.803 [INFO][3926] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9 Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.806 [INFO][3926] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.812 [INFO][3926] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.812 [INFO][3926] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" host="localhost" Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.812 [INFO][3926] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:58.837648 env[1250]: 2025-10-31 01:34:58.812 [INFO][3926] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" HandleID="k8s-pod-network.b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.813 [INFO][3913] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--rhh92-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"baface2f-bddc-4c4d-8b58-0007db010995", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-rhh92", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia03a2aea51b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.813 [INFO][3913] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.813 [INFO][3913] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia03a2aea51b ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.818 [INFO][3913] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.818 [INFO][3913] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--rhh92-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"baface2f-bddc-4c4d-8b58-0007db010995", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9", Pod:"coredns-674b8bbfcf-rhh92", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia03a2aea51b", MAC:"1e:16:d3:52:fa:61", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:58.838163 env[1250]: 2025-10-31 01:34:58.835 [INFO][3913] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9" Namespace="kube-system" Pod="coredns-674b8bbfcf-rhh92" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:34:58.863669 env[1250]: time="2025-10-31T01:34:58.863615138Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:58.863806 env[1250]: time="2025-10-31T01:34:58.863652770Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:58.863929 env[1250]: time="2025-10-31T01:34:58.863796979Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:58.864103 env[1250]: time="2025-10-31T01:34:58.864073486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9 pid=3947 runtime=io.containerd.runc.v2 Oct 31 01:34:58.880605 systemd[1]: Started cri-containerd-b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9.scope. Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.889000 audit: BPF prog-id=174 op=LOAD Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3947 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366239326135656461633433353266663239313236353439613230 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3947 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366239326135656461633433353266663239313236353439613230 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit: BPF prog-id=175 op=LOAD Oct 31 01:34:58.890000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dbd30 items=0 ppid=3947 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366239326135656461633433353266663239313236353439613230 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit: BPF prog-id=176 op=LOAD Oct 31 01:34:58.890000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dbd78 items=0 ppid=3947 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366239326135656461633433353266663239313236353439613230 Oct 31 01:34:58.890000 audit: BPF prog-id=176 op=UNLOAD Oct 31 01:34:58.890000 audit: BPF prog-id=175 op=UNLOAD Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:58.890000 audit: BPF prog-id=177 op=LOAD Oct 31 01:34:58.890000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2188 items=0 ppid=3947 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231366239326135656461633433353266663239313236353439613230 Oct 31 01:34:58.902000 audit[3977]: NETFILTER_CFG table=filter:115 family=2 entries=50 op=nft_register_chain pid=3977 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:58.902000 audit[3977]: SYSCALL arch=c000003e syscall=46 success=yes exit=24912 a0=3 a1=7ffdc857bc60 a2=0 a3=7ffdc857bc4c items=0 ppid=3337 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:58.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:58.892009 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:58.911873 env[1250]: time="2025-10-31T01:34:58.911822432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-rhh92,Uid:baface2f-bddc-4c4d-8b58-0007db010995,Namespace:kube-system,Attempt:1,} returns sandbox id \"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9\"" Oct 31 01:34:58.964184 env[1250]: time="2025-10-31T01:34:58.964154615Z" level=info msg="CreateContainer within sandbox \"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 01:34:58.978709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2770125011.mount: Deactivated successfully. Oct 31 01:34:58.981907 env[1250]: time="2025-10-31T01:34:58.981874391Z" level=info msg="CreateContainer within sandbox \"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"750c859034cb8f1ccb228344a58615c996ed90e9ce92c43c48b2f600ae6546b7\"" Oct 31 01:34:58.983705 env[1250]: time="2025-10-31T01:34:58.983311260Z" level=info msg="StartContainer for \"750c859034cb8f1ccb228344a58615c996ed90e9ce92c43c48b2f600ae6546b7\"" Oct 31 01:34:58.996031 systemd[1]: Started cri-containerd-750c859034cb8f1ccb228344a58615c996ed90e9ce92c43c48b2f600ae6546b7.scope. Oct 31 01:34:59.019198 systemd-networkd[1064]: cali8ee644ba214: Gained IPv6LL Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit: BPF prog-id=178 op=LOAD Oct 31 01:34:59.034000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.034000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3947 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306338353930333463623866316363623232383334346135383631 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3947 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306338353930333463623866316363623232383334346135383631 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit: BPF prog-id=179 op=LOAD Oct 31 01:34:59.035000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021a670 items=0 ppid=3947 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306338353930333463623866316363623232383334346135383631 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit: BPF prog-id=180 op=LOAD Oct 31 01:34:59.035000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021a6b8 items=0 ppid=3947 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306338353930333463623866316363623232383334346135383631 Oct 31 01:34:59.035000 audit: BPF prog-id=180 op=UNLOAD Oct 31 01:34:59.035000 audit: BPF prog-id=179 op=UNLOAD Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.035000 audit: BPF prog-id=181 op=LOAD Oct 31 01:34:59.035000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021aac8 items=0 ppid=3947 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735306338353930333463623866316363623232383334346135383631 Oct 31 01:34:59.050814 env[1250]: time="2025-10-31T01:34:59.050784279Z" level=info msg="StartContainer for \"750c859034cb8f1ccb228344a58615c996ed90e9ce92c43c48b2f600ae6546b7\" returns successfully" Oct 31 01:34:59.066766 env[1250]: time="2025-10-31T01:34:59.066734026Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:34:59.067488 env[1250]: time="2025-10-31T01:34:59.067464623Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:34:59.068261 kubelet[2113]: E1031 01:34:59.067677 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:34:59.068261 kubelet[2113]: E1031 01:34:59.067728 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:34:59.068261 kubelet[2113]: E1031 01:34:59.067833 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:34:59.069349 kubelet[2113]: E1031 01:34:59.069200 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:59.415172 env[1250]: time="2025-10-31T01:34:59.415130049Z" level=info msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" Oct 31 01:34:59.415384 env[1250]: time="2025-10-31T01:34:59.415367034Z" level=info msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" Oct 31 01:34:59.432000 audit[4004]: AVC avc: denied { getattr } for pid=4004 comm="coredns" path="cgroup:[4026533082]" dev="nsfs" ino=4026533082 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c719 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 01:34:59.432000 audit[4004]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000236198 a2=c0004ca2a8 a3=0 items=0 ppid=3947 pid=4004 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c719 key=(null) Oct 31 01:34:59.432000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.470 [INFO][4047] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.470 [INFO][4047] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" iface="eth0" netns="/var/run/netns/cni-8f9dba46-a205-9346-4fdf-3c414a71648f" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.471 [INFO][4047] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" iface="eth0" netns="/var/run/netns/cni-8f9dba46-a205-9346-4fdf-3c414a71648f" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.471 [INFO][4047] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" iface="eth0" netns="/var/run/netns/cni-8f9dba46-a205-9346-4fdf-3c414a71648f" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.471 [INFO][4047] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.471 [INFO][4047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.507 [INFO][4058] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.507 [INFO][4058] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.507 [INFO][4058] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.518 [WARNING][4058] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.519 [INFO][4058] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.519 [INFO][4058] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:59.522993 env[1250]: 2025-10-31 01:34:59.521 [INFO][4047] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:34:59.523498 env[1250]: time="2025-10-31T01:34:59.523118003Z" level=info msg="TearDown network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" successfully" Oct 31 01:34:59.523498 env[1250]: time="2025-10-31T01:34:59.523139245Z" level=info msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" returns successfully" Oct 31 01:34:59.524002 env[1250]: time="2025-10-31T01:34:59.523980751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8ch7c,Uid:e490228c-8cd4-4797-8ffe-a03a98da650a,Namespace:kube-system,Attempt:1,}" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.496 [INFO][4046] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.497 [INFO][4046] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" iface="eth0" netns="/var/run/netns/cni-72a7ccf9-0db4-1db3-056f-f0de37b9cf63" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.498 [INFO][4046] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" iface="eth0" netns="/var/run/netns/cni-72a7ccf9-0db4-1db3-056f-f0de37b9cf63" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.498 [INFO][4046] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" iface="eth0" netns="/var/run/netns/cni-72a7ccf9-0db4-1db3-056f-f0de37b9cf63" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.498 [INFO][4046] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.498 [INFO][4046] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.527 [INFO][4064] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.528 [INFO][4064] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.528 [INFO][4064] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.531 [WARNING][4064] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.531 [INFO][4064] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.533 [INFO][4064] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:59.535833 env[1250]: 2025-10-31 01:34:59.534 [INFO][4046] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:34:59.544815 env[1250]: time="2025-10-31T01:34:59.536912814Z" level=info msg="TearDown network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" successfully" Oct 31 01:34:59.544815 env[1250]: time="2025-10-31T01:34:59.536933169Z" level=info msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" returns successfully" Oct 31 01:34:59.544815 env[1250]: time="2025-10-31T01:34:59.537348465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-vvvhd,Uid:37cef8c3-ac2b-4e5e-92c5-b48103b3c543,Namespace:calico-system,Attempt:1,}" Oct 31 01:34:59.612258 systemd[1]: run-netns-cni\x2d8f9dba46\x2da205\x2d9346\x2d4fdf\x2d3c414a71648f.mount: Deactivated successfully. Oct 31 01:34:59.612311 systemd[1]: run-netns-cni\x2d72a7ccf9\x2d0db4\x2d1db3\x2d056f\x2df0de37b9cf63.mount: Deactivated successfully. Oct 31 01:34:59.639077 kubelet[2113]: E1031 01:34:59.639051 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:34:59.647257 kubelet[2113]: E1031 01:34:59.647225 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:34:59.756325 kubelet[2113]: I1031 01:34:59.747585 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-rhh92" podStartSLOduration=43.738513488 podStartE2EDuration="43.738513488s" podCreationTimestamp="2025-10-31 01:34:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:34:59.738326233 +0000 UTC m=+49.495966035" watchObservedRunningTime="2025-10-31 01:34:59.738513488 +0000 UTC m=+49.496153290" Oct 31 01:34:59.776142 systemd-networkd[1064]: calif0b1b7180bc: Link UP Oct 31 01:34:59.780055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:34:59.780131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0b1b7180bc: link becomes ready Oct 31 01:34:59.780635 systemd-networkd[1064]: calif0b1b7180bc: Gained carrier Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.591 [INFO][4072] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0 coredns-674b8bbfcf- kube-system e490228c-8cd4-4797-8ffe-a03a98da650a 982 0 2025-10-31 01:34:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-8ch7c eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif0b1b7180bc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.591 [INFO][4072] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.649 [INFO][4100] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" HandleID="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.649 [INFO][4100] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" HandleID="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002defe0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-8ch7c", "timestamp":"2025-10-31 01:34:59.649569773 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.649 [INFO][4100] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.649 [INFO][4100] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.649 [INFO][4100] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.676 [INFO][4100] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.691 [INFO][4100] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.717 [INFO][4100] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.723 [INFO][4100] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.726 [INFO][4100] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.726 [INFO][4100] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.734 [INFO][4100] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.743 [INFO][4100] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.762 [INFO][4100] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.762 [INFO][4100] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" host="localhost" Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.762 [INFO][4100] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:59.796575 env[1250]: 2025-10-31 01:34:59.762 [INFO][4100] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" HandleID="k8s-pod-network.bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.764 [INFO][4072] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"e490228c-8cd4-4797-8ffe-a03a98da650a", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-8ch7c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0b1b7180bc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.764 [INFO][4072] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.764 [INFO][4072] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif0b1b7180bc ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.780 [INFO][4072] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.781 [INFO][4072] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"e490228c-8cd4-4797-8ffe-a03a98da650a", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc", Pod:"coredns-674b8bbfcf-8ch7c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0b1b7180bc", MAC:"86:8e:d7:78:b6:de", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:59.801835 env[1250]: 2025-10-31 01:34:59.794 [INFO][4072] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-8ch7c" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:34:59.835259 env[1250]: time="2025-10-31T01:34:59.835201956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:59.835571 env[1250]: time="2025-10-31T01:34:59.835264166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:59.835571 env[1250]: time="2025-10-31T01:34:59.835289803Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:59.835646 env[1250]: time="2025-10-31T01:34:59.835619952Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc pid=4133 runtime=io.containerd.runc.v2 Oct 31 01:34:59.861188 systemd[1]: run-containerd-runc-k8s.io-bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc-runc.i4zmYF.mount: Deactivated successfully. Oct 31 01:34:59.866677 systemd[1]: Started cri-containerd-bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc.scope. Oct 31 01:34:59.890347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibdbbbea251a: link becomes ready Oct 31 01:34:59.890590 systemd-networkd[1064]: calibdbbbea251a: Link UP Oct 31 01:34:59.890739 systemd-networkd[1064]: calibdbbbea251a: Gained carrier Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit: BPF prog-id=182 op=LOAD Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4133 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623835373337326438396664636465363962323033656664363137 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4133 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623835373337326438396664636465363962323033656664363137 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.908000 audit: BPF prog-id=183 op=LOAD Oct 31 01:34:59.908000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a9620 items=0 ppid=4133 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623835373337326438396664636465363962323033656664363137 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit: BPF prog-id=184 op=LOAD Oct 31 01:34:59.909000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9668 items=0 ppid=4133 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623835373337326438396664636465363962323033656664363137 Oct 31 01:34:59.909000 audit: BPF prog-id=184 op=UNLOAD Oct 31 01:34:59.909000 audit: BPF prog-id=183 op=UNLOAD Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.909000 audit: BPF prog-id=185 op=LOAD Oct 31 01:34:59.909000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9a78 items=0 ppid=4133 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623835373337326438396664636465363962323033656664363137 Oct 31 01:34:59.913775 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:34:59.915117 systemd-networkd[1064]: cali92390d75924: Gained IPv6LL Oct 31 01:34:59.912000 audit[4156]: NETFILTER_CFG table=filter:116 family=2 entries=20 op=nft_register_rule pid=4156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.602 [INFO][4073] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--666569f655--vvvhd-eth0 goldmane-666569f655- calico-system 37cef8c3-ac2b-4e5e-92c5-b48103b3c543 983 0 2025-10-31 01:34:26 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-666569f655-vvvhd eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calibdbbbea251a [] [] }} ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.602 [INFO][4073] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.679 [INFO][4106] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" HandleID="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.679 [INFO][4106] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" HandleID="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d55a0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-666569f655-vvvhd", "timestamp":"2025-10-31 01:34:59.679162451 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.679 [INFO][4106] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.763 [INFO][4106] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.763 [INFO][4106] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.788 [INFO][4106] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.810 [INFO][4106] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.831 [INFO][4106] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.833 [INFO][4106] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.841 [INFO][4106] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.841 [INFO][4106] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.846 [INFO][4106] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85 Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.850 [INFO][4106] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.876 [INFO][4106] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.876 [INFO][4106] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" host="localhost" Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.876 [INFO][4106] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:34:59.920880 env[1250]: 2025-10-31 01:34:59.876 [INFO][4106] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" HandleID="k8s-pod-network.4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.912000 audit[4156]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffddaa8f870 a2=0 a3=7ffddaa8f85c items=0 ppid=2217 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.880 [INFO][4073] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--vvvhd-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"37cef8c3-ac2b-4e5e-92c5-b48103b3c543", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-666569f655-vvvhd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibdbbbea251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.880 [INFO][4073] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.880 [INFO][4073] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibdbbbea251a ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.894 [INFO][4073] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.894 [INFO][4073] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--vvvhd-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"37cef8c3-ac2b-4e5e-92c5-b48103b3c543", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85", Pod:"goldmane-666569f655-vvvhd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibdbbbea251a", MAC:"da:31:5d:30:53:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:34:59.922858 env[1250]: 2025-10-31 01:34:59.918 [INFO][4073] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85" Namespace="calico-system" Pod="goldmane-666569f655-vvvhd" WorkloadEndpoint="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:34:59.924000 audit[4158]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:34:59.928239 env[1250]: time="2025-10-31T01:34:59.928196507Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:34:59.928358 env[1250]: time="2025-10-31T01:34:59.928342045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:34:59.928435 env[1250]: time="2025-10-31T01:34:59.928419361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:34:59.928621 env[1250]: time="2025-10-31T01:34:59.928598133Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85 pid=4176 runtime=io.containerd.runc.v2 Oct 31 01:34:59.928000 audit[4156]: NETFILTER_CFG table=nat:118 family=2 entries=14 op=nft_register_rule pid=4156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:34:59.924000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7fff5d6b38d0 a2=0 a3=7fff5d6b38bc items=0 ppid=3337 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.924000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:34:59.928000 audit[4156]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffddaa8f870 a2=0 a3=11 items=0 ppid=2217 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:34:59.939498 systemd[1]: Started cri-containerd-4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85.scope. Oct 31 01:34:59.957640 env[1250]: time="2025-10-31T01:34:59.957600710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8ch7c,Uid:e490228c-8cd4-4797-8ffe-a03a98da650a,Namespace:kube-system,Attempt:1,} returns sandbox id \"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc\"" Oct 31 01:34:59.965311 env[1250]: time="2025-10-31T01:34:59.965279399Z" level=info msg="CreateContainer within sandbox \"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.973000 audit: BPF prog-id=186 op=LOAD Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323864316431646631613561666531326666643963336333633266 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323864316431646631613561666531326666643963336333633266 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit: BPF prog-id=187 op=LOAD Oct 31 01:34:59.974000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000206190 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323864316431646631613561666531326666643963336333633266 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit: BPF prog-id=188 op=LOAD Oct 31 01:34:59.974000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002061d8 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323864316431646631613561666531326666643963336333633266 Oct 31 01:34:59.974000 audit: BPF prog-id=188 op=UNLOAD Oct 31 01:34:59.974000 audit: BPF prog-id=187 op=UNLOAD Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:34:59.974000 audit: BPF prog-id=189 op=LOAD Oct 31 01:34:59.974000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002065e8 items=0 ppid=4176 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:34:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323864316431646631613561666531326666643963336333633266 Oct 31 01:34:59.981179 env[1250]: time="2025-10-31T01:34:59.977717478Z" level=info msg="CreateContainer within sandbox \"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"811e311a4bfde3bf27714760b9d1bfca3fb5d81a087cf60ea431099bf79fce62\"" Oct 31 01:34:59.981179 env[1250]: time="2025-10-31T01:34:59.978586376Z" level=info msg="StartContainer for \"811e311a4bfde3bf27714760b9d1bfca3fb5d81a087cf60ea431099bf79fce62\"" Oct 31 01:34:59.989211 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:00.002756 systemd[1]: Started cri-containerd-811e311a4bfde3bf27714760b9d1bfca3fb5d81a087cf60ea431099bf79fce62.scope. Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.016000 audit: BPF prog-id=190 op=LOAD Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4133 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316533313161346266646533626632373731343736306239643162 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4133 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316533313161346266646533626632373731343736306239643162 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit: BPF prog-id=191 op=LOAD Oct 31 01:35:00.017000 audit[4217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00027abb0 items=0 ppid=4133 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316533313161346266646533626632373731343736306239643162 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit: BPF prog-id=192 op=LOAD Oct 31 01:35:00.017000 audit[4217]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00027abf8 items=0 ppid=4133 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316533313161346266646533626632373731343736306239643162 Oct 31 01:35:00.017000 audit: BPF prog-id=192 op=UNLOAD Oct 31 01:35:00.017000 audit: BPF prog-id=191 op=UNLOAD Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { perfmon } for pid=4217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit[4217]: AVC avc: denied { bpf } for pid=4217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.017000 audit: BPF prog-id=193 op=LOAD Oct 31 01:35:00.017000 audit[4217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00027b008 items=0 ppid=4133 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316533313161346266646533626632373731343736306239643162 Oct 31 01:35:00.043190 env[1250]: time="2025-10-31T01:35:00.043154545Z" level=info msg="StartContainer for \"811e311a4bfde3bf27714760b9d1bfca3fb5d81a087cf60ea431099bf79fce62\" returns successfully" Oct 31 01:35:00.063000 audit[4233]: NETFILTER_CFG table=filter:119 family=2 entries=60 op=nft_register_chain pid=4233 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:00.063000 audit[4233]: SYSCALL arch=c000003e syscall=46 success=yes exit=29916 a0=3 a1=7fff63ad5d40 a2=0 a3=7fff63ad5d2c items=0 ppid=3337 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.063000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:00.081563 env[1250]: time="2025-10-31T01:35:00.081535175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-vvvhd,Uid:37cef8c3-ac2b-4e5e-92c5-b48103b3c543,Namespace:calico-system,Attempt:1,} returns sandbox id \"4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85\"" Oct 31 01:35:00.086000 audit[4227]: AVC avc: denied { getattr } for pid=4227 comm="coredns" path="cgroup:[4026532728]" dev="nsfs" ino=4026532728 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c920 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 01:35:00.086000 audit[4227]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014cc30 a2=c0004a1ca8 a3=0 items=0 ppid=4133 pid=4227 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c920 key=(null) Oct 31 01:35:00.086000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 01:35:00.098355 env[1250]: time="2025-10-31T01:35:00.098323418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:35:00.402914 env[1250]: time="2025-10-31T01:35:00.402870163Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:00.403857 env[1250]: time="2025-10-31T01:35:00.403829486Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:35:00.404055 kubelet[2113]: E1031 01:35:00.404016 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:00.404134 kubelet[2113]: E1031 01:35:00.404064 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:00.408974 kubelet[2113]: E1031 01:35:00.408912 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5mgfl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:00.410803 kubelet[2113]: E1031 01:35:00.410736 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:00.416719 env[1250]: time="2025-10-31T01:35:00.416686295Z" level=info msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.471 [INFO][4263] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.471 [INFO][4263] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" iface="eth0" netns="/var/run/netns/cni-a4ea755e-ae98-3c65-d02a-7d1b858e680b" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.472 [INFO][4263] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" iface="eth0" netns="/var/run/netns/cni-a4ea755e-ae98-3c65-d02a-7d1b858e680b" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.476 [INFO][4263] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" iface="eth0" netns="/var/run/netns/cni-a4ea755e-ae98-3c65-d02a-7d1b858e680b" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.476 [INFO][4263] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.476 [INFO][4263] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.497 [INFO][4271] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.497 [INFO][4271] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.497 [INFO][4271] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.506 [WARNING][4271] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.506 [INFO][4271] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.507 [INFO][4271] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:00.511202 env[1250]: 2025-10-31 01:35:00.509 [INFO][4263] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:00.511974 env[1250]: time="2025-10-31T01:35:00.511930720Z" level=info msg="TearDown network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" successfully" Oct 31 01:35:00.512078 env[1250]: time="2025-10-31T01:35:00.512058973Z" level=info msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" returns successfully" Oct 31 01:35:00.512640 env[1250]: time="2025-10-31T01:35:00.512623180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-qsrbm,Uid:258790e9-2d5b-4190-a0c6-8d34fb61e286,Namespace:calico-apiserver,Attempt:1,}" Oct 31 01:35:00.555628 systemd-networkd[1064]: calia03a2aea51b: Gained IPv6LL Oct 31 01:35:00.612426 systemd[1]: run-netns-cni\x2da4ea755e\x2dae98\x2d3c65\x2dd02a\x2d7d1b858e680b.mount: Deactivated successfully. Oct 31 01:35:00.615139 systemd-networkd[1064]: calidf25da23210: Link UP Oct 31 01:35:00.616568 systemd-networkd[1064]: calidf25da23210: Gained carrier Oct 31 01:35:00.617051 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf25da23210: link becomes ready Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.558 [INFO][4278] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0 calico-apiserver-7cd95f4479- calico-apiserver 258790e9-2d5b-4190-a0c6-8d34fb61e286 1010 0 2025-10-31 01:34:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7cd95f4479 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7cd95f4479-qsrbm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidf25da23210 [] [] }} ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.558 [INFO][4278] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.577 [INFO][4291] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" HandleID="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.577 [INFO][4291] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" HandleID="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002515d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7cd95f4479-qsrbm", "timestamp":"2025-10-31 01:35:00.577216361 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.577 [INFO][4291] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.577 [INFO][4291] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.577 [INFO][4291] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.582 [INFO][4291] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.585 [INFO][4291] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.588 [INFO][4291] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.588 [INFO][4291] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.590 [INFO][4291] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.590 [INFO][4291] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.591 [INFO][4291] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251 Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.599 [INFO][4291] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.606 [INFO][4291] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.606 [INFO][4291] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" host="localhost" Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.606 [INFO][4291] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:00.629285 env[1250]: 2025-10-31 01:35:00.606 [INFO][4291] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" HandleID="k8s-pod-network.fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.607 [INFO][4278] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"258790e9-2d5b-4190-a0c6-8d34fb61e286", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7cd95f4479-qsrbm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf25da23210", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.608 [INFO][4278] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.608 [INFO][4278] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidf25da23210 ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.616 [INFO][4278] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.617 [INFO][4278] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"258790e9-2d5b-4190-a0c6-8d34fb61e286", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251", Pod:"calico-apiserver-7cd95f4479-qsrbm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf25da23210", MAC:"6e:44:44:90:31:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:00.631158 env[1250]: 2025-10-31 01:35:00.626 [INFO][4278] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251" Namespace="calico-apiserver" Pod="calico-apiserver-7cd95f4479-qsrbm" WorkloadEndpoint="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:00.642985 env[1250]: time="2025-10-31T01:35:00.642924838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:35:00.643178 env[1250]: time="2025-10-31T01:35:00.643160393Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:35:00.643328 env[1250]: time="2025-10-31T01:35:00.643308825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:35:00.643638 env[1250]: time="2025-10-31T01:35:00.643612959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251 pid=4314 runtime=io.containerd.runc.v2 Oct 31 01:35:00.661172 systemd[1]: Started cri-containerd-fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251.scope. Oct 31 01:35:00.663000 audit[4330]: NETFILTER_CFG table=filter:120 family=2 entries=57 op=nft_register_chain pid=4330 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:35:00.663000 audit[4330]: SYSCALL arch=c000003e syscall=46 success=yes exit=27812 a0=3 a1=7ffcd77d7090 a2=0 a3=7ffcd77d707c items=0 ppid=3337 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:35:00.662641 systemd[1]: run-containerd-runc-k8s.io-fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251-runc.tYiFqX.mount: Deactivated successfully. Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.677000 audit: BPF prog-id=194 op=LOAD Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4314 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633537643638343463366563333338613239346535343731663166 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4314 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633537643638343463366563333338613239346535343731663166 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit: BPF prog-id=195 op=LOAD Oct 31 01:35:00.678000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000212f30 items=0 ppid=4314 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633537643638343463366563333338613239346535343731663166 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit: BPF prog-id=196 op=LOAD Oct 31 01:35:00.678000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000212f78 items=0 ppid=4314 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633537643638343463366563333338613239346535343731663166 Oct 31 01:35:00.678000 audit: BPF prog-id=196 op=UNLOAD Oct 31 01:35:00.678000 audit: BPF prog-id=195 op=UNLOAD Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:35:00.678000 audit: BPF prog-id=197 op=LOAD Oct 31 01:35:00.678000 audit[4324]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000213388 items=0 ppid=4314 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633537643638343463366563333338613239346535343731663166 Oct 31 01:35:00.685714 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:35:00.730000 audit[4348]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.730000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff067b31d0 a2=0 a3=7fff067b31bc items=0 ppid=2217 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.736834 kernel: kauditd_printk_skb: 549 callbacks suppressed Oct 31 01:35:00.736926 kernel: audit: type=1300 audit(1761874500.730:1287): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff067b31d0 a2=0 a3=7fff067b31bc items=0 ppid=2217 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.736948 kernel: audit: type=1327 audit(1761874500.730:1287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.740845 env[1250]: time="2025-10-31T01:35:00.740819492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cd95f4479-qsrbm,Uid:258790e9-2d5b-4190-a0c6-8d34fb61e286,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251\"" Oct 31 01:35:00.740000 audit[4348]: NETFILTER_CFG table=nat:122 family=2 entries=14 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.740000 audit[4348]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff067b31d0 a2=0 a3=0 items=0 ppid=2217 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.747711 kernel: audit: type=1325 audit(1761874500.740:1288): table=nat:122 family=2 entries=14 op=nft_register_rule pid=4348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.747813 kernel: audit: type=1300 audit(1761874500.740:1288): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff067b31d0 a2=0 a3=0 items=0 ppid=2217 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.747837 kernel: audit: type=1327 audit(1761874500.740:1288): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.841944 env[1250]: time="2025-10-31T01:35:00.841765395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:35:00.842837 kubelet[2113]: E1031 01:35:00.842805 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:00.866575 kubelet[2113]: I1031 01:35:00.866537 2113 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-8ch7c" podStartSLOduration=44.866523213 podStartE2EDuration="44.866523213s" podCreationTimestamp="2025-10-31 01:34:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 01:35:00.813630519 +0000 UTC m=+50.571270322" watchObservedRunningTime="2025-10-31 01:35:00.866523213 +0000 UTC m=+50.624163015" Oct 31 01:35:00.897000 audit[4350]: NETFILTER_CFG table=filter:123 family=2 entries=17 op=nft_register_rule pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.897000 audit[4350]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdf065e040 a2=0 a3=7ffdf065e02c items=0 ppid=2217 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.904080 kernel: audit: type=1325 audit(1761874500.897:1289): table=filter:123 family=2 entries=17 op=nft_register_rule pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.904195 kernel: audit: type=1300 audit(1761874500.897:1289): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdf065e040 a2=0 a3=7ffdf065e02c items=0 ppid=2217 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.908045 kernel: audit: type=1327 audit(1761874500.897:1289): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:00.905000 audit[4350]: NETFILTER_CFG table=nat:124 family=2 entries=35 op=nft_register_chain pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.916301 kernel: audit: type=1325 audit(1761874500.905:1290): table=nat:124 family=2 entries=35 op=nft_register_chain pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:00.916358 kernel: audit: type=1300 audit(1761874500.905:1290): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdf065e040 a2=0 a3=7ffdf065e02c items=0 ppid=2217 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.905000 audit[4350]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdf065e040 a2=0 a3=7ffdf065e02c items=0 ppid=2217 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:00.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:01.317985 env[1250]: time="2025-10-31T01:35:01.317741503Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:01.318290 env[1250]: time="2025-10-31T01:35:01.318213764Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:35:01.318411 kubelet[2113]: E1031 01:35:01.318378 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:01.318463 kubelet[2113]: E1031 01:35:01.318421 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:01.318579 kubelet[2113]: E1031 01:35:01.318534 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hxjlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:01.319796 kubelet[2113]: E1031 01:35:01.319777 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:01.387153 systemd-networkd[1064]: calif0b1b7180bc: Gained IPv6LL Oct 31 01:35:01.707162 systemd-networkd[1064]: calibdbbbea251a: Gained IPv6LL Oct 31 01:35:01.835197 systemd-networkd[1064]: calidf25da23210: Gained IPv6LL Oct 31 01:35:01.845340 kubelet[2113]: E1031 01:35:01.845303 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:01.845694 kubelet[2113]: E1031 01:35:01.845606 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:01.943000 audit[4352]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=4352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:01.943000 audit[4352]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe46b4c0f0 a2=0 a3=7ffe46b4c0dc items=0 ppid=2217 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:01.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:01.964000 audit[4352]: NETFILTER_CFG table=nat:126 family=2 entries=56 op=nft_register_chain pid=4352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:35:01.964000 audit[4352]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe46b4c0f0 a2=0 a3=7ffe46b4c0dc items=0 ppid=2217 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:01.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:35:02.846232 kubelet[2113]: E1031 01:35:02.846179 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:07.013000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.015947 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 01:35:07.015990 kernel: audit: type=1400 audit(1761874507.013:1293): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.013000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d99980 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:07.033575 kernel: audit: type=1300 audit(1761874507.013:1293): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d99980 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:07.033638 kernel: audit: type=1327 audit(1761874507.013:1293): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:07.033681 kernel: audit: type=1400 audit(1761874507.013:1294): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.033694 kernel: audit: type=1300 audit(1761874507.013:1294): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d6ac80 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:07.033709 kernel: audit: type=1327 audit(1761874507.013:1294): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:07.013000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:07.013000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.013000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d6ac80 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:07.013000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:07.314000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.314000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f441260 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.325165 kernel: audit: type=1400 audit(1761874507.314:1295): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.330046 kernel: audit: type=1300 audit(1761874507.314:1295): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f441260 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.330080 kernel: audit: type=1327 audit(1761874507.314:1295): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.330104 kernel: audit: type=1400 audit(1761874507.315:1296): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.314000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.315000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.315000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00b6075c0 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.329000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6762 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.329000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00b607620 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.333000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.333000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f441280 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.339000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.339000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b58dc20 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:07.348000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6768 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:07.348000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00b58dd10 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:35:07.348000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:35:10.495999 env[1250]: time="2025-10-31T01:35:10.495970971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:35:10.519843 env[1250]: time="2025-10-31T01:35:10.519807181Z" level=info msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.579 [WARNING][4374] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--rhh92-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"baface2f-bddc-4c4d-8b58-0007db010995", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9", Pod:"coredns-674b8bbfcf-rhh92", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia03a2aea51b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.579 [INFO][4374] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.579 [INFO][4374] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" iface="eth0" netns="" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.579 [INFO][4374] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.579 [INFO][4374] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.594 [INFO][4381] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.594 [INFO][4381] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.594 [INFO][4381] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.599 [WARNING][4381] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.599 [INFO][4381] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.600 [INFO][4381] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:10.602853 env[1250]: 2025-10-31 01:35:10.601 [INFO][4374] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.603368 env[1250]: time="2025-10-31T01:35:10.602871186Z" level=info msg="TearDown network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" successfully" Oct 31 01:35:10.603368 env[1250]: time="2025-10-31T01:35:10.602892110Z" level=info msg="StopPodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" returns successfully" Oct 31 01:35:10.613956 env[1250]: time="2025-10-31T01:35:10.613807060Z" level=info msg="RemovePodSandbox for \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" Oct 31 01:35:10.614087 env[1250]: time="2025-10-31T01:35:10.613890162Z" level=info msg="Forcibly stopping sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\"" Oct 31 01:35:10.631000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:10.631000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d6afa0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:10.631000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:10.631000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:10.631000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002dfe7e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:10.631000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:10.631000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:10.631000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d6afc0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:10.631000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:10.646000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:35:10.646000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d6b2e0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:35:10.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.654 [WARNING][4395] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--rhh92-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"baface2f-bddc-4c4d-8b58-0007db010995", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b16b92a5edac4352ff29126549a2010e79f708f360ee421835ea3ef84fe823b9", Pod:"coredns-674b8bbfcf-rhh92", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia03a2aea51b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.654 [INFO][4395] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.654 [INFO][4395] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" iface="eth0" netns="" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.654 [INFO][4395] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.654 [INFO][4395] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.670 [INFO][4402] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.670 [INFO][4402] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.670 [INFO][4402] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.676 [WARNING][4402] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.676 [INFO][4402] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" HandleID="k8s-pod-network.95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Workload="localhost-k8s-coredns--674b8bbfcf--rhh92-eth0" Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.677 [INFO][4402] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:10.680123 env[1250]: 2025-10-31 01:35:10.678 [INFO][4395] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012" Oct 31 01:35:10.680716 env[1250]: time="2025-10-31T01:35:10.680685520Z" level=info msg="TearDown network for sandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" successfully" Oct 31 01:35:10.685574 env[1250]: time="2025-10-31T01:35:10.685541863Z" level=info msg="RemovePodSandbox \"95ff60dcdbad394acaa79b6ed9931a2e661de28905a951639f939f73e1e35012\" returns successfully" Oct 31 01:35:10.686291 env[1250]: time="2025-10-31T01:35:10.686258802Z" level=info msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.718 [WARNING][4416] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"219495e8-c37f-4fb2-a42b-662657c7b41b", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a", Pod:"calico-apiserver-7cd95f4479-rxdv6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a8bca362bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.719 [INFO][4416] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.719 [INFO][4416] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" iface="eth0" netns="" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.719 [INFO][4416] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.719 [INFO][4416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.736 [INFO][4425] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.737 [INFO][4425] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.737 [INFO][4425] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.742 [WARNING][4425] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.742 [INFO][4425] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.743 [INFO][4425] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:10.746899 env[1250]: 2025-10-31 01:35:10.745 [INFO][4416] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.748137 env[1250]: time="2025-10-31T01:35:10.746863886Z" level=info msg="TearDown network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" successfully" Oct 31 01:35:10.748137 env[1250]: time="2025-10-31T01:35:10.748113166Z" level=info msg="StopPodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" returns successfully" Oct 31 01:35:10.748523 env[1250]: time="2025-10-31T01:35:10.748508920Z" level=info msg="RemovePodSandbox for \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" Oct 31 01:35:10.748618 env[1250]: time="2025-10-31T01:35:10.748591372Z" level=info msg="Forcibly stopping sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\"" Oct 31 01:35:10.829357 env[1250]: time="2025-10-31T01:35:10.829327323Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:10.830679 env[1250]: time="2025-10-31T01:35:10.830623862Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:35:10.831467 kubelet[2113]: E1031 01:35:10.831436 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:35:10.831687 kubelet[2113]: E1031 01:35:10.831476 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:35:10.832819 kubelet[2113]: E1031 01:35:10.831839 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:6cba03db46bf4c90b2541965f6c92e10,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:10.835101 env[1250]: time="2025-10-31T01:35:10.834839879Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.822 [WARNING][4439] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"219495e8-c37f-4fb2-a42b-662657c7b41b", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb95c98cef88efb5403cf3bee168d7bc12f91b1e9cfa9b7b1f48e5f53cf61d0a", Pod:"calico-apiserver-7cd95f4479-rxdv6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a8bca362bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.822 [INFO][4439] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.822 [INFO][4439] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" iface="eth0" netns="" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.822 [INFO][4439] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.822 [INFO][4439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.846 [INFO][4446] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.846 [INFO][4446] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.847 [INFO][4446] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.850 [WARNING][4446] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.851 [INFO][4446] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" HandleID="k8s-pod-network.e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Workload="localhost-k8s-calico--apiserver--7cd95f4479--rxdv6-eth0" Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.852 [INFO][4446] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:10.856633 env[1250]: 2025-10-31 01:35:10.854 [INFO][4439] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2" Oct 31 01:35:10.857257 env[1250]: time="2025-10-31T01:35:10.857239136Z" level=info msg="TearDown network for sandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" successfully" Oct 31 01:35:10.859002 env[1250]: time="2025-10-31T01:35:10.858987489Z" level=info msg="RemovePodSandbox \"e31f3101603a5423a0f67c32b57018ce627caf5b8cad4c47304902117024a3f2\" returns successfully" Oct 31 01:35:10.859663 env[1250]: time="2025-10-31T01:35:10.859448029Z" level=info msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.886 [WARNING][4460] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0", GenerateName:"calico-kube-controllers-c968f69f7-", Namespace:"calico-system", SelfLink:"", UID:"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c968f69f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476", Pod:"calico-kube-controllers-c968f69f7-xxxq9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92390d75924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.886 [INFO][4460] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.886 [INFO][4460] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" iface="eth0" netns="" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.886 [INFO][4460] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.886 [INFO][4460] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.900 [INFO][4467] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.900 [INFO][4467] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.901 [INFO][4467] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.933 [WARNING][4467] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.934 [INFO][4467] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.934 [INFO][4467] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:10.937110 env[1250]: 2025-10-31 01:35:10.935 [INFO][4460] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:10.937507 env[1250]: time="2025-10-31T01:35:10.937485212Z" level=info msg="TearDown network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" successfully" Oct 31 01:35:10.937570 env[1250]: time="2025-10-31T01:35:10.937558257Z" level=info msg="StopPodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" returns successfully" Oct 31 01:35:10.937924 env[1250]: time="2025-10-31T01:35:10.937910783Z" level=info msg="RemovePodSandbox for \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" Oct 31 01:35:10.938009 env[1250]: time="2025-10-31T01:35:10.937985340Z" level=info msg="Forcibly stopping sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\"" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:10.975 [WARNING][4482] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0", GenerateName:"calico-kube-controllers-c968f69f7-", Namespace:"calico-system", SelfLink:"", UID:"5edf9cae-9eb4-43f9-9dfa-cdffa758deb5", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c968f69f7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f3bb33f293867a571b0714b44cb3df8bdd915ff714214f94985e03f40f80e476", Pod:"calico-kube-controllers-c968f69f7-xxxq9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92390d75924", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:10.976 [INFO][4482] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:10.976 [INFO][4482] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" iface="eth0" netns="" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:10.976 [INFO][4482] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:10.976 [INFO][4482] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.006 [INFO][4489] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.006 [INFO][4489] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.006 [INFO][4489] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.012 [WARNING][4489] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.012 [INFO][4489] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" HandleID="k8s-pod-network.cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Workload="localhost-k8s-calico--kube--controllers--c968f69f7--xxxq9-eth0" Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.013 [INFO][4489] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.015847 env[1250]: 2025-10-31 01:35:11.014 [INFO][4482] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b" Oct 31 01:35:11.020846 env[1250]: time="2025-10-31T01:35:11.015825209Z" level=info msg="TearDown network for sandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" successfully" Oct 31 01:35:11.042344 env[1250]: time="2025-10-31T01:35:11.042229907Z" level=info msg="RemovePodSandbox \"cd7ee910d462d9e30588e1385d931b5b0386d7548970f00347d48e99ef56916b\" returns successfully" Oct 31 01:35:11.042603 env[1250]: time="2025-10-31T01:35:11.042579531Z" level=info msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.066 [WARNING][4503] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"e490228c-8cd4-4797-8ffe-a03a98da650a", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc", Pod:"coredns-674b8bbfcf-8ch7c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0b1b7180bc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.066 [INFO][4503] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.066 [INFO][4503] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" iface="eth0" netns="" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.066 [INFO][4503] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.066 [INFO][4503] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.079 [INFO][4510] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.079 [INFO][4510] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.079 [INFO][4510] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.083 [WARNING][4510] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.083 [INFO][4510] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.084 [INFO][4510] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.086851 env[1250]: 2025-10-31 01:35:11.085 [INFO][4503] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.087222 env[1250]: time="2025-10-31T01:35:11.086865260Z" level=info msg="TearDown network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" successfully" Oct 31 01:35:11.087222 env[1250]: time="2025-10-31T01:35:11.086889994Z" level=info msg="StopPodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" returns successfully" Oct 31 01:35:11.087222 env[1250]: time="2025-10-31T01:35:11.087187060Z" level=info msg="RemovePodSandbox for \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" Oct 31 01:35:11.087222 env[1250]: time="2025-10-31T01:35:11.087204714Z" level=info msg="Forcibly stopping sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\"" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.118 [WARNING][4525] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"e490228c-8cd4-4797-8ffe-a03a98da650a", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bcb857372d89fdcde69b203efd6172c6b7a0daaf29d1c6f4bfbb594f893884cc", Pod:"coredns-674b8bbfcf-8ch7c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0b1b7180bc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.118 [INFO][4525] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.118 [INFO][4525] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" iface="eth0" netns="" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.118 [INFO][4525] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.118 [INFO][4525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.131 [INFO][4532] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.131 [INFO][4532] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.131 [INFO][4532] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.135 [WARNING][4532] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.135 [INFO][4532] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" HandleID="k8s-pod-network.204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Workload="localhost-k8s-coredns--674b8bbfcf--8ch7c-eth0" Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.136 [INFO][4532] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.138815 env[1250]: 2025-10-31 01:35:11.137 [INFO][4525] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1" Oct 31 01:35:11.139255 env[1250]: time="2025-10-31T01:35:11.139232922Z" level=info msg="TearDown network for sandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" successfully" Oct 31 01:35:11.153097 env[1250]: time="2025-10-31T01:35:11.153066912Z" level=info msg="RemovePodSandbox \"204d9f42d7021ffe2ff1f64c636c2df3c77bf239fbb81296df7b4aba1ef61eb1\" returns successfully" Oct 31 01:35:11.153538 env[1250]: time="2025-10-31T01:35:11.153518979Z" level=info msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" Oct 31 01:35:11.197151 env[1250]: time="2025-10-31T01:35:11.197114344Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:11.210954 env[1250]: time="2025-10-31T01:35:11.210910228Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:35:11.211169 kubelet[2113]: E1031 01:35:11.211139 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:35:11.211215 kubelet[2113]: E1031 01:35:11.211183 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:35:11.211313 kubelet[2113]: E1031 01:35:11.211289 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.191 [WARNING][4547] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hszfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47a38da1-fd15-4cb6-9f0a-aefa44fb658a", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd", Pod:"csi-node-driver-hszfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8ee644ba214", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.191 [INFO][4547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.191 [INFO][4547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" iface="eth0" netns="" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.191 [INFO][4547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.191 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.205 [INFO][4554] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.205 [INFO][4554] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.205 [INFO][4554] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.209 [WARNING][4554] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.209 [INFO][4554] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.210 [INFO][4554] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.213605 env[1250]: 2025-10-31 01:35:11.211 [INFO][4547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.213920 env[1250]: time="2025-10-31T01:35:11.213620776Z" level=info msg="TearDown network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" successfully" Oct 31 01:35:11.213920 env[1250]: time="2025-10-31T01:35:11.213657149Z" level=info msg="StopPodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" returns successfully" Oct 31 01:35:11.213961 env[1250]: time="2025-10-31T01:35:11.213925920Z" level=info msg="RemovePodSandbox for \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" Oct 31 01:35:11.213983 env[1250]: time="2025-10-31T01:35:11.213952109Z" level=info msg="Forcibly stopping sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\"" Oct 31 01:35:11.218885 kubelet[2113]: E1031 01:35:11.218837 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.239 [WARNING][4568] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hszfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47a38da1-fd15-4cb6-9f0a-aefa44fb658a", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bb461751c094af798b2d504199ef057a88dac1c4b97cb0a1ee222e1d56bf18cd", Pod:"csi-node-driver-hszfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8ee644ba214", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.239 [INFO][4568] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.239 [INFO][4568] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" iface="eth0" netns="" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.239 [INFO][4568] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.239 [INFO][4568] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.254 [INFO][4575] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.254 [INFO][4575] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.254 [INFO][4575] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.258 [WARNING][4575] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.258 [INFO][4575] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" HandleID="k8s-pod-network.a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Workload="localhost-k8s-csi--node--driver--hszfb-eth0" Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.259 [INFO][4575] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.262283 env[1250]: 2025-10-31 01:35:11.261 [INFO][4568] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396" Oct 31 01:35:11.265208 env[1250]: time="2025-10-31T01:35:11.262304061Z" level=info msg="TearDown network for sandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" successfully" Oct 31 01:35:11.265208 env[1250]: time="2025-10-31T01:35:11.264496145Z" level=info msg="RemovePodSandbox \"a0c4d4bca29face18fc808934fd01f6388f4d6932fd7d7d7c5e7729dc87c9396\" returns successfully" Oct 31 01:35:11.265208 env[1250]: time="2025-10-31T01:35:11.264790476Z" level=info msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.288 [WARNING][4589] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" WorkloadEndpoint="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.288 [INFO][4589] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.288 [INFO][4589] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" iface="eth0" netns="" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.288 [INFO][4589] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.288 [INFO][4589] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.303 [INFO][4596] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.303 [INFO][4596] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.303 [INFO][4596] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.308 [WARNING][4596] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.308 [INFO][4596] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.310 [INFO][4596] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.312625 env[1250]: 2025-10-31 01:35:11.311 [INFO][4589] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.314136 env[1250]: time="2025-10-31T01:35:11.314077051Z" level=info msg="TearDown network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" successfully" Oct 31 01:35:11.314136 env[1250]: time="2025-10-31T01:35:11.314112473Z" level=info msg="StopPodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" returns successfully" Oct 31 01:35:11.314438 env[1250]: time="2025-10-31T01:35:11.314419992Z" level=info msg="RemovePodSandbox for \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" Oct 31 01:35:11.314473 env[1250]: time="2025-10-31T01:35:11.314442176Z" level=info msg="Forcibly stopping sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\"" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.340 [WARNING][4610] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" WorkloadEndpoint="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.340 [INFO][4610] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.340 [INFO][4610] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" iface="eth0" netns="" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.340 [INFO][4610] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.340 [INFO][4610] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.374 [INFO][4618] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.374 [INFO][4618] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.374 [INFO][4618] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.381 [WARNING][4618] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.381 [INFO][4618] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" HandleID="k8s-pod-network.d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Workload="localhost-k8s-whisker--dfbf68594--nwhp9-eth0" Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.382 [INFO][4618] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.385744 env[1250]: 2025-10-31 01:35:11.384 [INFO][4610] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779" Oct 31 01:35:11.386082 env[1250]: time="2025-10-31T01:35:11.385767652Z" level=info msg="TearDown network for sandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" successfully" Oct 31 01:35:11.387272 env[1250]: time="2025-10-31T01:35:11.387249050Z" level=info msg="RemovePodSandbox \"d51a7e2f0057ad6d12ed0901ae0398d015a5f004740dc9c7063830409d126779\" returns successfully" Oct 31 01:35:11.387633 env[1250]: time="2025-10-31T01:35:11.387606131Z" level=info msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" Oct 31 01:35:11.422461 env[1250]: time="2025-10-31T01:35:11.422436798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.413 [WARNING][4633] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"258790e9-2d5b-4190-a0c6-8d34fb61e286", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251", Pod:"calico-apiserver-7cd95f4479-qsrbm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf25da23210", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.413 [INFO][4633] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.413 [INFO][4633] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" iface="eth0" netns="" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.413 [INFO][4633] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.413 [INFO][4633] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.439 [INFO][4641] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.439 [INFO][4641] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.439 [INFO][4641] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.443 [WARNING][4641] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.443 [INFO][4641] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.445 [INFO][4641] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.447499 env[1250]: 2025-10-31 01:35:11.446 [INFO][4633] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.447922 env[1250]: time="2025-10-31T01:35:11.447899259Z" level=info msg="TearDown network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" successfully" Oct 31 01:35:11.447972 env[1250]: time="2025-10-31T01:35:11.447960717Z" level=info msg="StopPodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" returns successfully" Oct 31 01:35:11.448413 env[1250]: time="2025-10-31T01:35:11.448394359Z" level=info msg="RemovePodSandbox for \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" Oct 31 01:35:11.448449 env[1250]: time="2025-10-31T01:35:11.448416694Z" level=info msg="Forcibly stopping sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\"" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.470 [WARNING][4656] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0", GenerateName:"calico-apiserver-7cd95f4479-", Namespace:"calico-apiserver", SelfLink:"", UID:"258790e9-2d5b-4190-a0c6-8d34fb61e286", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cd95f4479", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fac57d6844c6ec338a294e5471f1f7d3a314d24499d8d9b5f27fad4e27c7f251", Pod:"calico-apiserver-7cd95f4479-qsrbm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf25da23210", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.470 [INFO][4656] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.470 [INFO][4656] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" iface="eth0" netns="" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.470 [INFO][4656] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.470 [INFO][4656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.485 [INFO][4663] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.485 [INFO][4663] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.485 [INFO][4663] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.490 [WARNING][4663] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.490 [INFO][4663] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" HandleID="k8s-pod-network.afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Workload="localhost-k8s-calico--apiserver--7cd95f4479--qsrbm-eth0" Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.492 [INFO][4663] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.494921 env[1250]: 2025-10-31 01:35:11.493 [INFO][4656] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236" Oct 31 01:35:11.495549 env[1250]: time="2025-10-31T01:35:11.494948346Z" level=info msg="TearDown network for sandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" successfully" Oct 31 01:35:11.496862 env[1250]: time="2025-10-31T01:35:11.496830208Z" level=info msg="RemovePodSandbox \"afc55281f2877132e5a4325a10a61e2eb9b087b0d33df4b5f68dba03b0bbf236\" returns successfully" Oct 31 01:35:11.497418 env[1250]: time="2025-10-31T01:35:11.497399446Z" level=info msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.523 [WARNING][4677] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--vvvhd-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"37cef8c3-ac2b-4e5e-92c5-b48103b3c543", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85", Pod:"goldmane-666569f655-vvvhd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibdbbbea251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.523 [INFO][4677] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.523 [INFO][4677] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" iface="eth0" netns="" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.523 [INFO][4677] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.523 [INFO][4677] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.541 [INFO][4684] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.542 [INFO][4684] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.542 [INFO][4684] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.548 [WARNING][4684] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.548 [INFO][4684] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.549 [INFO][4684] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.553056 env[1250]: 2025-10-31 01:35:11.551 [INFO][4677] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.553459 env[1250]: time="2025-10-31T01:35:11.553076027Z" level=info msg="TearDown network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" successfully" Oct 31 01:35:11.553459 env[1250]: time="2025-10-31T01:35:11.553104606Z" level=info msg="StopPodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" returns successfully" Oct 31 01:35:11.553704 env[1250]: time="2025-10-31T01:35:11.553681597Z" level=info msg="RemovePodSandbox for \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" Oct 31 01:35:11.553778 env[1250]: time="2025-10-31T01:35:11.553753305Z" level=info msg="Forcibly stopping sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\"" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.585 [WARNING][4698] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--666569f655--vvvhd-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"37cef8c3-ac2b-4e5e-92c5-b48103b3c543", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 34, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4228d1d1df1a5afe12ffd9c3c3c2ffae587921d3596059cfb60abaa4f9c77c85", Pod:"goldmane-666569f655-vvvhd", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calibdbbbea251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.586 [INFO][4698] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.586 [INFO][4698] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" iface="eth0" netns="" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.586 [INFO][4698] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.586 [INFO][4698] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.604 [INFO][4706] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.604 [INFO][4706] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.604 [INFO][4706] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.609 [WARNING][4706] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.609 [INFO][4706] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" HandleID="k8s-pod-network.80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Workload="localhost-k8s-goldmane--666569f655--vvvhd-eth0" Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.610 [INFO][4706] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:35:11.613071 env[1250]: 2025-10-31 01:35:11.611 [INFO][4698] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c" Oct 31 01:35:11.613518 env[1250]: time="2025-10-31T01:35:11.613494739Z" level=info msg="TearDown network for sandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" successfully" Oct 31 01:35:11.615065 env[1250]: time="2025-10-31T01:35:11.615012707Z" level=info msg="RemovePodSandbox \"80aa03438debba066d399884d76eac73aa131d78121085cfc3957eff031c993c\" returns successfully" Oct 31 01:35:11.767906 env[1250]: time="2025-10-31T01:35:11.767871043Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:11.768468 env[1250]: time="2025-10-31T01:35:11.768429939Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:35:11.768753 kubelet[2113]: E1031 01:35:11.768714 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:35:11.768834 kubelet[2113]: E1031 01:35:11.768759 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:35:11.768912 kubelet[2113]: E1031 01:35:11.768853 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8tj2g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:11.770134 kubelet[2113]: E1031 01:35:11.770079 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:35:13.443869 env[1250]: time="2025-10-31T01:35:13.443830204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:35:13.783982 env[1250]: time="2025-10-31T01:35:13.783910046Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:13.789338 env[1250]: time="2025-10-31T01:35:13.789308542Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:35:13.789460 kubelet[2113]: E1031 01:35:13.789438 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:13.789647 kubelet[2113]: E1031 01:35:13.789476 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:13.789678 kubelet[2113]: E1031 01:35:13.789640 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-76z8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:13.790037 env[1250]: time="2025-10-31T01:35:13.789869264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:35:13.791741 kubelet[2113]: E1031 01:35:13.791720 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:35:14.150246 env[1250]: time="2025-10-31T01:35:14.150198805Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:14.155933 env[1250]: time="2025-10-31T01:35:14.155896160Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:35:14.156092 kubelet[2113]: E1031 01:35:14.156062 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:14.156158 kubelet[2113]: E1031 01:35:14.156099 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:14.156250 kubelet[2113]: E1031 01:35:14.156223 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:14.156599 env[1250]: time="2025-10-31T01:35:14.156584661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:35:14.509143 env[1250]: time="2025-10-31T01:35:14.508890921Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:14.509922 env[1250]: time="2025-10-31T01:35:14.509887605Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:35:14.510104 kubelet[2113]: E1031 01:35:14.510072 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:14.510168 kubelet[2113]: E1031 01:35:14.510108 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:14.510345 env[1250]: time="2025-10-31T01:35:14.510327706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:35:14.510856 kubelet[2113]: E1031 01:35:14.510819 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hxjlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:14.512314 kubelet[2113]: E1031 01:35:14.512293 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:14.846554 env[1250]: time="2025-10-31T01:35:14.846502597Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:14.846847 env[1250]: time="2025-10-31T01:35:14.846821911Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:35:14.847014 kubelet[2113]: E1031 01:35:14.846987 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:14.847215 kubelet[2113]: E1031 01:35:14.847034 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:14.847215 kubelet[2113]: E1031 01:35:14.847190 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5mgfl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:14.847748 env[1250]: time="2025-10-31T01:35:14.847491472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:35:14.849007 kubelet[2113]: E1031 01:35:14.848973 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:15.193917 env[1250]: time="2025-10-31T01:35:15.193820580Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:15.194275 env[1250]: time="2025-10-31T01:35:15.194172531Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:35:15.194465 kubelet[2113]: E1031 01:35:15.194438 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:15.194515 kubelet[2113]: E1031 01:35:15.194472 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:15.194575 kubelet[2113]: E1031 01:35:15.194547 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:15.195768 kubelet[2113]: E1031 01:35:15.195750 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:35:23.415441 kubelet[2113]: E1031 01:35:23.415405 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:35:25.462122 kubelet[2113]: E1031 01:35:25.462069 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:35:25.462890 kubelet[2113]: E1031 01:35:25.462868 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:35:26.416624 kubelet[2113]: E1031 01:35:26.416585 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:26.426474 kubelet[2113]: E1031 01:35:26.416990 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:35:29.415773 kubelet[2113]: E1031 01:35:29.415744 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:37.422348 env[1250]: time="2025-10-31T01:35:37.422316482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:35:37.763167 env[1250]: time="2025-10-31T01:35:37.763073502Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:37.764389 env[1250]: time="2025-10-31T01:35:37.763758263Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:35:37.767385 kubelet[2113]: E1031 01:35:37.765386 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:37.768114 kubelet[2113]: E1031 01:35:37.767395 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:37.768153 env[1250]: time="2025-10-31T01:35:37.767676391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:35:37.770910 kubelet[2113]: E1031 01:35:37.770871 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-76z8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:37.772162 kubelet[2113]: E1031 01:35:37.772144 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:35:38.105806 env[1250]: time="2025-10-31T01:35:38.105598377Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:38.106121 env[1250]: time="2025-10-31T01:35:38.106048075Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:35:38.106270 kubelet[2113]: E1031 01:35:38.106233 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:35:38.106850 kubelet[2113]: E1031 01:35:38.106281 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:35:38.106890 kubelet[2113]: E1031 01:35:38.106431 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8tj2g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:38.108385 kubelet[2113]: E1031 01:35:38.108363 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:35:38.416404 env[1250]: time="2025-10-31T01:35:38.415942926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:35:38.760781 env[1250]: time="2025-10-31T01:35:38.760687431Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:38.761366 env[1250]: time="2025-10-31T01:35:38.761342892Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:35:38.761596 kubelet[2113]: E1031 01:35:38.761572 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:35:38.761669 kubelet[2113]: E1031 01:35:38.761657 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:35:38.761808 kubelet[2113]: E1031 01:35:38.761786 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:6cba03db46bf4c90b2541965f6c92e10,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:38.763532 env[1250]: time="2025-10-31T01:35:38.763516491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:35:39.101353 env[1250]: time="2025-10-31T01:35:39.101298522Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:39.101880 env[1250]: time="2025-10-31T01:35:39.101841572Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:35:39.102188 kubelet[2113]: E1031 01:35:39.102153 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:35:39.102410 kubelet[2113]: E1031 01:35:39.102195 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:35:39.102613 kubelet[2113]: E1031 01:35:39.102320 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:39.103819 kubelet[2113]: E1031 01:35:39.103786 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:35:39.416219 env[1250]: time="2025-10-31T01:35:39.416136915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:35:39.763860 env[1250]: time="2025-10-31T01:35:39.763775733Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:39.764461 env[1250]: time="2025-10-31T01:35:39.764438143Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:35:39.765912 kubelet[2113]: E1031 01:35:39.765878 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:39.766005 kubelet[2113]: E1031 01:35:39.765992 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:35:39.766183 kubelet[2113]: E1031 01:35:39.766161 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:39.768429 env[1250]: time="2025-10-31T01:35:39.768403099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:35:40.106325 env[1250]: time="2025-10-31T01:35:40.106283749Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:40.106848 env[1250]: time="2025-10-31T01:35:40.106823766Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:35:40.107082 kubelet[2113]: E1031 01:35:40.107061 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:40.107303 kubelet[2113]: E1031 01:35:40.107291 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:35:40.107720 kubelet[2113]: E1031 01:35:40.107569 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:40.110569 kubelet[2113]: E1031 01:35:40.108681 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:35:41.416104 env[1250]: time="2025-10-31T01:35:41.415840953Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:35:41.723793 env[1250]: time="2025-10-31T01:35:41.723531186Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:41.724062 env[1250]: time="2025-10-31T01:35:41.723988474Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:35:41.724475 kubelet[2113]: E1031 01:35:41.724141 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:41.724475 kubelet[2113]: E1031 01:35:41.724171 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:35:41.724475 kubelet[2113]: E1031 01:35:41.724255 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hxjlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:41.725849 kubelet[2113]: E1031 01:35:41.725344 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:44.417915 env[1250]: time="2025-10-31T01:35:44.417664162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:35:44.733094 env[1250]: time="2025-10-31T01:35:44.732809718Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:35:44.733469 env[1250]: time="2025-10-31T01:35:44.733379577Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:35:44.740721 kubelet[2113]: E1031 01:35:44.740688 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:44.743127 kubelet[2113]: E1031 01:35:44.743100 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:35:44.743336 kubelet[2113]: E1031 01:35:44.743303 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5mgfl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:35:44.744565 kubelet[2113]: E1031 01:35:44.744547 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:45.841469 systemd[1]: Started sshd@7-139.178.70.108:22-147.75.109.163:54752.service. Oct 31 01:35:45.853111 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 31 01:35:45.859889 kernel: audit: type=1130 audit(1761874545.841:1305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-147.75.109.163:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:45.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-147.75.109.163:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:46.098535 sshd[4761]: Accepted publickey for core from 147.75.109.163 port 54752 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:46.108952 kernel: audit: type=1101 audit(1761874546.096:1306): pid=4761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.109012 kernel: audit: type=1103 audit(1761874546.101:1307): pid=4761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.114774 kernel: audit: type=1006 audit(1761874546.101:1308): pid=4761 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 31 01:35:46.114825 kernel: audit: type=1300 audit(1761874546.101:1308): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23f23990 a2=3 a3=0 items=0 ppid=1 pid=4761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:46.096000 audit[4761]: USER_ACCT pid=4761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.125740 kernel: audit: type=1327 audit(1761874546.101:1308): proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:46.101000 audit[4761]: CRED_ACQ pid=4761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.101000 audit[4761]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23f23990 a2=3 a3=0 items=0 ppid=1 pid=4761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:46.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:46.120410 sshd[4761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:46.182173 systemd-logind[1237]: New session 10 of user core. Oct 31 01:35:46.182759 systemd[1]: Started session-10.scope. Oct 31 01:35:46.185000 audit[4761]: USER_START pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.192039 kernel: audit: type=1105 audit(1761874546.185:1309): pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.191000 audit[4763]: CRED_ACQ pid=4763 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.197052 kernel: audit: type=1103 audit(1761874546.191:1310): pid=4763 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.951694 sshd[4761]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:46.951000 audit[4761]: USER_END pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.955000 audit[4761]: CRED_DISP pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.959926 kernel: audit: type=1106 audit(1761874546.951:1311): pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.959972 kernel: audit: type=1104 audit(1761874546.955:1312): pid=4761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:46.960539 systemd-logind[1237]: Session 10 logged out. Waiting for processes to exit. Oct 31 01:35:46.961197 systemd[1]: sshd@7-139.178.70.108:22-147.75.109.163:54752.service: Deactivated successfully. Oct 31 01:35:46.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-147.75.109.163:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:46.961745 systemd[1]: session-10.scope: Deactivated successfully. Oct 31 01:35:46.962367 systemd-logind[1237]: Removed session 10. Oct 31 01:35:48.602523 kubelet[2113]: E1031 01:35:48.602466 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:35:51.476337 kubelet[2113]: E1031 01:35:51.476271 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:35:51.488746 kubelet[2113]: E1031 01:35:51.488718 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:35:51.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-147.75.109.163:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:51.954521 systemd[1]: Started sshd@8-139.178.70.108:22-147.75.109.163:35142.service. Oct 31 01:35:51.961970 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:35:51.962027 kernel: audit: type=1130 audit(1761874551.953:1314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-147.75.109.163:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:52.554986 sshd[4802]: Accepted publickey for core from 147.75.109.163 port 35142 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:52.553000 audit[4802]: USER_ACCT pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.563358 kernel: audit: type=1101 audit(1761874552.553:1315): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.563420 kernel: audit: type=1103 audit(1761874552.554:1316): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.554000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.577640 kernel: audit: type=1006 audit(1761874552.554:1317): pid=4802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 31 01:35:52.582531 kernel: audit: type=1300 audit(1761874552.554:1317): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d0d5c00 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.582588 kernel: audit: type=1327 audit(1761874552.554:1317): proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:52.554000 audit[4802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d0d5c00 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:52.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:52.577736 sshd[4802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:52.606535 systemd[1]: Started session-11.scope. Oct 31 01:35:52.607313 systemd-logind[1237]: New session 11 of user core. Oct 31 01:35:52.610000 audit[4802]: USER_START pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.619220 kernel: audit: type=1105 audit(1761874552.610:1318): pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.619270 kernel: audit: type=1103 audit(1761874552.614:1319): pid=4806 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:52.614000 audit[4806]: CRED_ACQ pid=4806 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:55.748040 kubelet[2113]: E1031 01:35:55.747986 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:35:55.814917 kubelet[2113]: E1031 01:35:55.814880 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:35:57.415470 kubelet[2113]: E1031 01:35:57.415431 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:35:58.492923 systemd[1]: Started sshd@9-139.178.70.108:22-147.75.109.163:35148.service. Oct 31 01:35:58.527954 kernel: audit: type=1130 audit(1761874558.492:1320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-147.75.109.163:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:58.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-147.75.109.163:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:58.580718 sshd[4802]: pam_unix(sshd:session): session closed for user core Oct 31 01:35:58.661000 audit[4802]: USER_END pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:58.671782 kernel: audit: type=1106 audit(1761874558.661:1321): pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:58.684000 audit[4802]: CRED_DISP pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:58.698805 kernel: audit: type=1104 audit(1761874558.684:1322): pid=4802 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:58.755588 systemd[1]: sshd@8-139.178.70.108:22-147.75.109.163:35142.service: Deactivated successfully. Oct 31 01:35:58.804958 kernel: audit: type=1131 audit(1761874558.754:1323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-147.75.109.163:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:58.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-147.75.109.163:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:35:58.756144 systemd[1]: session-11.scope: Deactivated successfully. Oct 31 01:35:58.758798 systemd-logind[1237]: Session 11 logged out. Waiting for processes to exit. Oct 31 01:35:58.759316 systemd-logind[1237]: Removed session 11. Oct 31 01:35:59.296000 audit[4816]: USER_ACCT pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.299246 sshd[4816]: Accepted publickey for core from 147.75.109.163 port 35148 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:35:59.315579 kernel: audit: type=1101 audit(1761874559.296:1324): pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.315629 kernel: audit: type=1103 audit(1761874559.300:1325): pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.315655 kernel: audit: type=1006 audit(1761874559.300:1326): pid=4816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 31 01:35:59.315702 kernel: audit: type=1300 audit(1761874559.300:1326): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe1bd9ab0 a2=3 a3=0 items=0 ppid=1 pid=4816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:59.336177 kernel: audit: type=1327 audit(1761874559.300:1326): proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:59.300000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.300000 audit[4816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe1bd9ab0 a2=3 a3=0 items=0 ppid=1 pid=4816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:35:59.300000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:35:59.329064 sshd[4816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:35:59.360210 systemd[1]: Started session-12.scope. Oct 31 01:35:59.360370 systemd-logind[1237]: New session 12 of user core. Oct 31 01:35:59.364000 audit[4816]: USER_START pid=4816 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.368000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:35:59.370136 kernel: audit: type=1105 audit(1761874559.364:1327): pid=4816 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.104417 systemd[1]: Started sshd@10-139.178.70.108:22-147.75.109.163:58566.service. Oct 31 01:36:00.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-147.75.109.163:58566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:00.109515 sshd[4816]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:00.118000 audit[4816]: USER_END pid=4816 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.118000 audit[4816]: CRED_DISP pid=4816 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-147.75.109.163:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:00.120699 systemd-logind[1237]: Session 12 logged out. Waiting for processes to exit. Oct 31 01:36:00.120890 systemd[1]: sshd@9-139.178.70.108:22-147.75.109.163:35148.service: Deactivated successfully. Oct 31 01:36:00.121563 systemd[1]: session-12.scope: Deactivated successfully. Oct 31 01:36:00.122217 systemd-logind[1237]: Removed session 12. Oct 31 01:36:00.326000 audit[4826]: USER_ACCT pid=4826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.328590 sshd[4826]: Accepted publickey for core from 147.75.109.163 port 58566 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:00.327000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.328000 audit[4826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd6b844e0 a2=3 a3=0 items=0 ppid=1 pid=4826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:00.328000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:00.338000 audit[4826]: USER_START pid=4826 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.339000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.329265 sshd[4826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:00.335309 systemd[1]: Started session-13.scope. Oct 31 01:36:00.336015 systemd-logind[1237]: New session 13 of user core. Oct 31 01:36:00.808426 sshd[4826]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:00.812000 audit[4826]: USER_END pid=4826 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.812000 audit[4826]: CRED_DISP pid=4826 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:00.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-147.75.109.163:58566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:00.814562 systemd[1]: sshd@10-139.178.70.108:22-147.75.109.163:58566.service: Deactivated successfully. Oct 31 01:36:00.816406 systemd[1]: session-13.scope: Deactivated successfully. Oct 31 01:36:00.817335 systemd-logind[1237]: Session 13 logged out. Waiting for processes to exit. Oct 31 01:36:00.818344 systemd-logind[1237]: Removed session 13. Oct 31 01:36:04.430719 kubelet[2113]: E1031 01:36:04.430656 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:36:05.416139 kubelet[2113]: E1031 01:36:05.416111 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:36:05.807858 systemd[1]: Started sshd@11-139.178.70.108:22-147.75.109.163:58582.service. Oct 31 01:36:05.831437 kernel: kauditd_printk_skb: 15 callbacks suppressed Oct 31 01:36:05.860988 kernel: audit: type=1130 audit(1761874565.806:1341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-147.75.109.163:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:05.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-147.75.109.163:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:06.416166 kubelet[2113]: E1031 01:36:06.416137 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:36:07.144000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.201703 kernel: audit: type=1400 audit(1761874567.144:1342): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.202417 kernel: audit: type=1300 audit(1761874567.144:1342): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f3080 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:07.202474 kernel: audit: type=1327 audit(1761874567.144:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:07.202507 kernel: audit: type=1400 audit(1761874567.161:1343): avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.202535 kernel: audit: type=1300 audit(1761874567.161:1343): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a64810 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:07.208717 kernel: audit: type=1327 audit(1761874567.161:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:07.144000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f3080 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:07.144000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:07.161000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.161000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a64810 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:07.161000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:07.274000 audit[4838]: USER_ACCT pid=4838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.275545 sshd[4838]: Accepted publickey for core from 147.75.109.163 port 58582 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:07.279055 kernel: audit: type=1101 audit(1761874567.274:1344): pid=4838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.293000 audit[4838]: CRED_ACQ pid=4838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.299706 kernel: audit: type=1103 audit(1761874567.293:1345): pid=4838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.308325 kernel: audit: type=1006 audit(1761874567.293:1346): pid=4838 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 31 01:36:07.293000 audit[4838]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcbb4fb20 a2=3 a3=0 items=0 ppid=1 pid=4838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:07.293000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:07.321605 sshd[4838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:07.367742 systemd[1]: Started session-14.scope. Oct 31 01:36:07.370000 audit[4838]: USER_START pid=4838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.371000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:07.367931 systemd-logind[1237]: New session 14 of user core. Oct 31 01:36:07.454000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6762 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.454000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007c84390 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:07.476000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6768 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.476000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0045606c0 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:07.508000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.508000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c004560750 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.508000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:07.514000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.514000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c009e2e680 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:07.528000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.528000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e148000 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:07.714000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6766 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:07.714000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c007c84420 a2=fc6 a3=0 items=0 ppid=1810 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c628 key=(null) Oct 31 01:36:07.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 01:36:08.958736 sshd[4838]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:08.958000 audit[4838]: USER_END pid=4838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:08.958000 audit[4838]: CRED_DISP pid=4838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:08.960854 systemd[1]: sshd@11-139.178.70.108:22-147.75.109.163:58582.service: Deactivated successfully. Oct 31 01:36:08.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-147.75.109.163:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:08.961508 systemd[1]: session-14.scope: Deactivated successfully. Oct 31 01:36:08.962416 systemd-logind[1237]: Session 14 logged out. Waiting for processes to exit. Oct 31 01:36:08.963140 systemd-logind[1237]: Removed session 14. Oct 31 01:36:09.415817 kubelet[2113]: E1031 01:36:09.415792 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:36:09.416343 kubelet[2113]: E1031 01:36:09.416151 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:36:10.632000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:10.632000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:10.632000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f3d40 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:10.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:10.633000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:10.633000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f3d60 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:10.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:10.632000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016d5440 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:10.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:10.647000 audit[1963]: AVC avc: denied { watch } for pid=1963 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 01:36:10.647000 audit[1963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013f3dc0 a2=fc6 a3=0 items=0 ppid=1792 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c365,c515 key=(null) Oct 31 01:36:10.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 01:36:11.111038 kubelet[2113]: E1031 01:36:11.105702 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:36:13.984731 systemd[1]: Started sshd@12-139.178.70.108:22-147.75.109.163:47888.service. Oct 31 01:36:14.007679 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 31 01:36:14.015749 kernel: audit: type=1130 audit(1761874573.983:1362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-147.75.109.163:47888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:13.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-147.75.109.163:47888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:14.427374 sshd[4859]: Accepted publickey for core from 147.75.109.163 port 47888 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:14.434902 kernel: audit: type=1101 audit(1761874574.426:1363): pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.434954 kernel: audit: type=1103 audit(1761874574.427:1364): pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.434971 kernel: audit: type=1006 audit(1761874574.427:1365): pid=4859 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 31 01:36:14.426000 audit[4859]: USER_ACCT pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.445563 kernel: audit: type=1300 audit(1761874574.427:1365): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd905b4df0 a2=3 a3=0 items=0 ppid=1 pid=4859 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.445603 kernel: audit: type=1327 audit(1761874574.427:1365): proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:14.427000 audit[4859]: CRED_ACQ pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.457466 kernel: audit: type=1105 audit(1761874574.447:1366): pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.457526 kernel: audit: type=1103 audit(1761874574.451:1367): pid=4862 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.427000 audit[4859]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd905b4df0 a2=3 a3=0 items=0 ppid=1 pid=4859 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:14.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:14.447000 audit[4859]: USER_START pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.451000 audit[4862]: CRED_ACQ pid=4862 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:14.440267 sshd[4859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:14.444504 systemd[1]: Started session-15.scope. Oct 31 01:36:14.445194 systemd-logind[1237]: New session 15 of user core. Oct 31 01:36:15.670317 sshd[4859]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:15.734000 audit[4859]: USER_END pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:15.749423 kernel: audit: type=1106 audit(1761874575.734:1368): pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:15.749487 kernel: audit: type=1104 audit(1761874575.734:1369): pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:15.734000 audit[4859]: CRED_DISP pid=4859 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:15.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-147.75.109.163:47888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:15.741374 systemd[1]: sshd@12-139.178.70.108:22-147.75.109.163:47888.service: Deactivated successfully. Oct 31 01:36:15.742028 systemd[1]: session-15.scope: Deactivated successfully. Oct 31 01:36:15.745877 systemd-logind[1237]: Session 15 logged out. Waiting for processes to exit. Oct 31 01:36:15.746545 systemd-logind[1237]: Removed session 15. Oct 31 01:36:16.420321 kubelet[2113]: E1031 01:36:16.420284 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:36:18.517713 env[1250]: time="2025-10-31T01:36:18.517683615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:36:18.858808 env[1250]: time="2025-10-31T01:36:18.858636322Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:18.976214 env[1250]: time="2025-10-31T01:36:18.976131365Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:36:19.096378 kubelet[2113]: E1031 01:36:19.096312 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:36:19.131407 kubelet[2113]: E1031 01:36:19.131312 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:36:19.131748 env[1250]: time="2025-10-31T01:36:19.131658901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 01:36:19.260676 kubelet[2113]: E1031 01:36:19.260616 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-76z8v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-rxdv6_calico-apiserver(219495e8-c37f-4fb2-a42b-662657c7b41b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:19.261999 kubelet[2113]: E1031 01:36:19.261972 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:36:20.645232 env[1250]: time="2025-10-31T01:36:20.645192957Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:20.658426 env[1250]: time="2025-10-31T01:36:20.654540469Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 01:36:20.658494 kubelet[2113]: E1031 01:36:20.654679 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:36:20.658494 kubelet[2113]: E1031 01:36:20.654711 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 01:36:20.658494 kubelet[2113]: E1031 01:36:20.654811 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8tj2g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-c968f69f7-xxxq9_calico-system(5edf9cae-9eb4-43f9-9dfa-cdffa758deb5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:20.658494 kubelet[2113]: E1031 01:36:20.656123 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:36:20.669867 systemd[1]: Started sshd@13-139.178.70.108:22-147.75.109.163:34778.service. Oct 31 01:36:20.673039 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:36:20.678440 kernel: audit: type=1130 audit(1761874580.668:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-147.75.109.163:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:20.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-147.75.109.163:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:20.807000 audit[4879]: USER_ACCT pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.812385 sshd[4879]: Accepted publickey for core from 147.75.109.163 port 34778 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:20.811000 audit[4879]: CRED_ACQ pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.815763 kernel: audit: type=1101 audit(1761874580.807:1372): pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.815864 kernel: audit: type=1103 audit(1761874580.811:1373): pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.818183 kernel: audit: type=1006 audit(1761874580.811:1374): pid=4879 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 31 01:36:20.821965 kernel: audit: type=1300 audit(1761874580.811:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0a1770 a2=3 a3=0 items=0 ppid=1 pid=4879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.824654 kernel: audit: type=1327 audit(1761874580.811:1374): proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:20.811000 audit[4879]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0a1770 a2=3 a3=0 items=0 ppid=1 pid=4879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:20.811000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:20.822094 sshd[4879]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:20.828213 systemd[1]: Started session-16.scope. Oct 31 01:36:20.828372 systemd-logind[1237]: New session 16 of user core. Oct 31 01:36:20.831000 audit[4879]: USER_START pid=4879 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.841108 kernel: audit: type=1105 audit(1761874580.831:1375): pid=4879 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.841148 kernel: audit: type=1103 audit(1761874580.836:1376): pid=4883 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:20.836000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.120386 sshd[4879]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:21.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-147.75.109.163:34784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:21.128220 kernel: audit: type=1130 audit(1761874581.123:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-147.75.109.163:34784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:21.124186 systemd[1]: Started sshd@14-139.178.70.108:22-147.75.109.163:34784.service. Oct 31 01:36:21.127000 audit[4879]: USER_END pid=4879 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.136097 kernel: audit: type=1106 audit(1761874581.127:1378): pid=4879 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.137264 systemd[1]: sshd@13-139.178.70.108:22-147.75.109.163:34778.service: Deactivated successfully. Oct 31 01:36:21.137826 systemd[1]: session-16.scope: Deactivated successfully. Oct 31 01:36:21.127000 audit[4879]: CRED_DISP pid=4879 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-147.75.109.163:34778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:21.138667 systemd-logind[1237]: Session 16 logged out. Waiting for processes to exit. Oct 31 01:36:21.139244 systemd-logind[1237]: Removed session 16. Oct 31 01:36:21.155000 audit[4891]: USER_ACCT pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.156501 sshd[4891]: Accepted publickey for core from 147.75.109.163 port 34784 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:21.156000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.156000 audit[4891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdc130950 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:21.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:21.161648 systemd[1]: Started session-17.scope. Oct 31 01:36:21.157910 sshd[4891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:21.162874 systemd-logind[1237]: New session 17 of user core. Oct 31 01:36:21.165000 audit[4891]: USER_START pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.167000 audit[4894]: CRED_ACQ pid=4894 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:21.467201 env[1250]: time="2025-10-31T01:36:21.466920023Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 01:36:21.800783 env[1250]: time="2025-10-31T01:36:21.800412330Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:21.800783 env[1250]: time="2025-10-31T01:36:21.800733564Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 01:36:21.801793 kubelet[2113]: E1031 01:36:21.801316 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:36:21.801793 kubelet[2113]: E1031 01:36:21.801370 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 01:36:21.801793 kubelet[2113]: E1031 01:36:21.801470 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:6cba03db46bf4c90b2541965f6c92e10,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:21.804008 env[1250]: time="2025-10-31T01:36:21.803073686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 01:36:22.125647 env[1250]: time="2025-10-31T01:36:22.125609497Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:22.128641 env[1250]: time="2025-10-31T01:36:22.128609422Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 01:36:22.128899 kubelet[2113]: E1031 01:36:22.128860 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:36:22.128978 kubelet[2113]: E1031 01:36:22.128910 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 01:36:22.129116 kubelet[2113]: E1031 01:36:22.129015 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsj9t,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-567f555684-zlgvm_calico-system(ebc6c587-4d46-47d9-896b-543e1944b1c1): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:22.130468 kubelet[2113]: E1031 01:36:22.130428 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:36:22.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.108:22-147.75.109.163:34790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:22.240301 systemd[1]: Started sshd@15-139.178.70.108:22-147.75.109.163:34790.service. Oct 31 01:36:22.248394 sshd[4891]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:22.248000 audit[4891]: USER_END pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:22.252000 audit[4891]: CRED_DISP pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:22.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-147.75.109.163:34784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:22.258523 systemd[1]: sshd@14-139.178.70.108:22-147.75.109.163:34784.service: Deactivated successfully. Oct 31 01:36:22.259846 systemd[1]: session-17.scope: Deactivated successfully. Oct 31 01:36:22.259874 systemd-logind[1237]: Session 17 logged out. Waiting for processes to exit. Oct 31 01:36:22.261154 systemd-logind[1237]: Removed session 17. Oct 31 01:36:22.500972 sshd[4924]: Accepted publickey for core from 147.75.109.163 port 34790 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:22.499000 audit[4924]: USER_ACCT pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:22.500000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:22.501000 audit[4924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8eedb840 a2=3 a3=0 items=0 ppid=1 pid=4924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:22.501000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:22.505351 sshd[4924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:22.508381 systemd-logind[1237]: New session 18 of user core. Oct 31 01:36:22.508858 systemd[1]: Started session-18.scope. Oct 31 01:36:22.511000 audit[4924]: USER_START pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:22.512000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.422265 env[1250]: time="2025-10-31T01:36:23.422218858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 01:36:23.735103 sshd[4924]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:23.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.108:22-147.75.109.163:34800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:23.794000 audit[4924]: USER_END pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.797000 audit[4924]: CRED_DISP pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.108:22-147.75.109.163:34790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:23.810866 env[1250]: time="2025-10-31T01:36:23.761669062Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:23.810866 env[1250]: time="2025-10-31T01:36:23.771235826Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 01:36:23.752339 systemd[1]: Started sshd@16-139.178.70.108:22-147.75.109.163:34800.service. Oct 31 01:36:23.799853 systemd[1]: sshd@15-139.178.70.108:22-147.75.109.163:34790.service: Deactivated successfully. Oct 31 01:36:23.800906 systemd[1]: session-18.scope: Deactivated successfully. Oct 31 01:36:23.800953 systemd-logind[1237]: Session 18 logged out. Waiting for processes to exit. Oct 31 01:36:23.802062 systemd-logind[1237]: Removed session 18. Oct 31 01:36:23.818559 kubelet[2113]: E1031 01:36:23.818523 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:36:23.825568 kubelet[2113]: E1031 01:36:23.825527 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 01:36:23.828969 kubelet[2113]: E1031 01:36:23.828926 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hxjlh,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7cd95f4479-qsrbm_calico-apiserver(258790e9-2d5b-4190-a0c6-8d34fb61e286): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:23.833461 kubelet[2113]: E1031 01:36:23.833435 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:36:23.896000 audit[4943]: USER_ACCT pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.902268 sshd[4943]: Accepted publickey for core from 147.75.109.163 port 34800 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:23.911000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.911000 audit[4943]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaf98cfa0 a2=3 a3=0 items=0 ppid=1 pid=4943 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:23.911000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:23.918930 systemd-logind[1237]: New session 19 of user core. Oct 31 01:36:23.914945 sshd[4943]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:23.919458 systemd[1]: Started session-19.scope. Oct 31 01:36:23.925000 audit[4943]: USER_START pid=4943 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:23.930000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:24.065000 audit[4949]: NETFILTER_CFG table=filter:127 family=2 entries=26 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:24.065000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffcb0d09680 a2=0 a3=7ffcb0d0966c items=0 ppid=2217 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:24.077000 audit[4949]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:24.077000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb0d09680 a2=0 a3=0 items=0 ppid=2217 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:24.091000 audit[4951]: NETFILTER_CFG table=filter:129 family=2 entries=38 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:24.091000 audit[4951]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc12fb2370 a2=0 a3=7ffc12fb235c items=0 ppid=2217 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:24.094000 audit[4951]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:24.094000 audit[4951]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc12fb2370 a2=0 a3=0 items=0 ppid=2217 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:24.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:24.689498 kubelet[2113]: E1031 01:36:24.689457 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:36:25.574716 systemd[1]: Started sshd@17-139.178.70.108:22-147.75.109.163:34814.service. Oct 31 01:36:25.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.108:22-147.75.109.163:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:25.589000 audit[4943]: USER_END pid=4943 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:25.590000 audit[4943]: CRED_DISP pid=4943 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:25.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.108:22-147.75.109.163:34800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:25.592763 systemd[1]: sshd@16-139.178.70.108:22-147.75.109.163:34800.service: Deactivated successfully. Oct 31 01:36:25.576829 sshd[4943]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:25.593374 systemd[1]: session-19.scope: Deactivated successfully. Oct 31 01:36:25.594352 systemd-logind[1237]: Session 19 logged out. Waiting for processes to exit. Oct 31 01:36:25.595452 systemd-logind[1237]: Removed session 19. Oct 31 01:36:26.095000 audit[4964]: USER_ACCT pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.096981 sshd[4964]: Accepted publickey for core from 147.75.109.163 port 34814 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:26.097740 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 31 01:36:26.105277 kernel: audit: type=1101 audit(1761874586.095:1412): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.105322 kernel: audit: type=1103 audit(1761874586.097:1413): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.097000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.103366 sshd[4964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:26.109037 kernel: audit: type=1006 audit(1761874586.097:1414): pid=4964 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 31 01:36:26.097000 audit[4964]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe489e1380 a2=3 a3=0 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:26.114135 kernel: audit: type=1300 audit(1761874586.097:1414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe489e1380 a2=3 a3=0 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:26.114604 systemd-logind[1237]: New session 20 of user core. Oct 31 01:36:26.097000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:26.115203 systemd[1]: Started session-20.scope. Oct 31 01:36:26.118056 kernel: audit: type=1327 audit(1761874586.097:1414): proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:26.119000 audit[4964]: USER_START pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.120000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.128588 kernel: audit: type=1105 audit(1761874586.119:1415): pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.128646 kernel: audit: type=1103 audit(1761874586.120:1416): pid=4967 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.404039 sshd[4964]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:26.404000 audit[4964]: USER_END pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.407196 systemd[1]: sshd@17-139.178.70.108:22-147.75.109.163:34814.service: Deactivated successfully. Oct 31 01:36:26.407660 systemd[1]: session-20.scope: Deactivated successfully. Oct 31 01:36:26.410052 kernel: audit: type=1106 audit(1761874586.404:1417): pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.410144 systemd-logind[1237]: Session 20 logged out. Waiting for processes to exit. Oct 31 01:36:26.404000 audit[4964]: CRED_DISP pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.413693 systemd-logind[1237]: Removed session 20. Oct 31 01:36:26.414044 kernel: audit: type=1104 audit(1761874586.404:1418): pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:26.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.108:22-147.75.109.163:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:26.418058 kernel: audit: type=1131 audit(1761874586.404:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.108:22-147.75.109.163:34814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:27.453049 env[1250]: time="2025-10-31T01:36:27.453005064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:36:27.914197 env[1250]: time="2025-10-31T01:36:27.914135742Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:27.917245 env[1250]: time="2025-10-31T01:36:27.917166359Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:36:27.951519 kubelet[2113]: E1031 01:36:27.951472 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:27.955733 kubelet[2113]: E1031 01:36:27.955705 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:36:27.957488 kubelet[2113]: E1031 01:36:27.957456 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:27.959137 env[1250]: time="2025-10-31T01:36:27.959117239Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:36:28.294991 env[1250]: time="2025-10-31T01:36:28.294732448Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:28.295285 env[1250]: time="2025-10-31T01:36:28.295197069Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:36:28.295490 kubelet[2113]: E1031 01:36:28.295467 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:28.295568 kubelet[2113]: E1031 01:36:28.295555 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:36:28.295720 kubelet[2113]: E1031 01:36:28.295691 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hg2fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-hszfb_calico-system(47a38da1-fd15-4cb6-9f0a-aefa44fb658a): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:28.296938 kubelet[2113]: E1031 01:36:28.296906 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a" Oct 31 01:36:29.025000 audit[4992]: NETFILTER_CFG table=filter:131 family=2 entries=26 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:29.025000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffffd961150 a2=0 a3=7ffffd96113c items=0 ppid=2217 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:29.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:29.031000 audit[4992]: NETFILTER_CFG table=nat:132 family=2 entries=104 op=nft_register_chain pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:36:29.031000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffffd961150 a2=0 a3=7ffffd96113c items=0 ppid=2217 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:29.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:36:31.408833 systemd[1]: Started sshd@18-139.178.70.108:22-147.75.109.163:55528.service. Oct 31 01:36:31.413490 kernel: kauditd_printk_skb: 6 callbacks suppressed Oct 31 01:36:31.413540 kernel: audit: type=1130 audit(1761874591.407:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.108:22-147.75.109.163:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:31.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.108:22-147.75.109.163:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:31.416539 kubelet[2113]: E1031 01:36:31.415278 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-rxdv6" podUID="219495e8-c37f-4fb2-a42b-662657c7b41b" Oct 31 01:36:31.643277 sshd[4994]: Accepted publickey for core from 147.75.109.163 port 55528 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:31.641000 audit[4994]: USER_ACCT pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.642000 audit[4994]: CRED_ACQ pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.650308 kernel: audit: type=1101 audit(1761874591.641:1423): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.650386 kernel: audit: type=1103 audit(1761874591.642:1424): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.652027 sshd[4994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:31.652346 kernel: audit: type=1006 audit(1761874591.642:1425): pid=4994 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 31 01:36:31.654196 kernel: audit: type=1300 audit(1761874591.642:1425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcec15260 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:31.642000 audit[4994]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcec15260 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:31.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:31.656934 kernel: audit: type=1327 audit(1761874591.642:1425): proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:31.659167 systemd-logind[1237]: New session 21 of user core. Oct 31 01:36:31.660037 systemd[1]: Started session-21.scope. Oct 31 01:36:31.662000 audit[4994]: USER_START pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.672727 kernel: audit: type=1105 audit(1761874591.662:1426): pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.672788 kernel: audit: type=1103 audit(1761874591.662:1427): pid=4996 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:31.662000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:32.233473 sshd[4994]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:32.233000 audit[4994]: USER_END pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:32.233000 audit[4994]: CRED_DISP pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:32.242088 kernel: audit: type=1106 audit(1761874592.233:1428): pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:32.242128 kernel: audit: type=1104 audit(1761874592.233:1429): pid=4994 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:32.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.108:22-147.75.109.163:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:32.242390 systemd[1]: sshd@18-139.178.70.108:22-147.75.109.163:55528.service: Deactivated successfully. Oct 31 01:36:32.242924 systemd[1]: session-21.scope: Deactivated successfully. Oct 31 01:36:32.247444 systemd-logind[1237]: Session 21 logged out. Waiting for processes to exit. Oct 31 01:36:32.248500 systemd-logind[1237]: Removed session 21. Oct 31 01:36:33.415934 kubelet[2113]: E1031 01:36:33.415901 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-c968f69f7-xxxq9" podUID="5edf9cae-9eb4-43f9-9dfa-cdffa758deb5" Oct 31 01:36:37.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.108:22-147.75.109.163:55536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:37.242390 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 01:36:37.242440 kernel: audit: type=1130 audit(1761874597.233:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.108:22-147.75.109.163:55536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:37.234110 systemd[1]: Started sshd@19-139.178.70.108:22-147.75.109.163:55536.service. Oct 31 01:36:37.387707 sshd[5006]: Accepted publickey for core from 147.75.109.163 port 55536 ssh2: RSA SHA256:5EJg7y3pv7Ht00E4mNOtVA/MuREJjzW0PuLgUWDrRw0 Oct 31 01:36:37.386000 audit[5006]: USER_ACCT pid=5006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.390000 audit[5006]: CRED_ACQ pid=5006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.394448 kernel: audit: type=1101 audit(1761874597.386:1432): pid=5006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.394529 kernel: audit: type=1103 audit(1761874597.390:1433): pid=5006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.394914 kernel: audit: type=1006 audit(1761874597.390:1434): pid=5006 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 31 01:36:37.390000 audit[5006]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73518140 a2=3 a3=0 items=0 ppid=1 pid=5006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:37.399942 kernel: audit: type=1300 audit(1761874597.390:1434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73518140 a2=3 a3=0 items=0 ppid=1 pid=5006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:36:37.400553 kernel: audit: type=1327 audit(1761874597.390:1434): proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:37.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:36:37.401292 sshd[5006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:36:37.404619 systemd-logind[1237]: New session 22 of user core. Oct 31 01:36:37.405233 systemd[1]: Started session-22.scope. Oct 31 01:36:37.408000 audit[5006]: USER_START pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.414035 kernel: audit: type=1105 audit(1761874597.408:1435): pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.413000 audit[5008]: CRED_ACQ pid=5008 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.418053 kernel: audit: type=1103 audit(1761874597.413:1436): pid=5008 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:37.420160 kubelet[2113]: E1031 01:36:37.420125 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-7cd95f4479-qsrbm" podUID="258790e9-2d5b-4190-a0c6-8d34fb61e286" Oct 31 01:36:37.421313 kubelet[2113]: E1031 01:36:37.420900 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-567f555684-zlgvm" podUID="ebc6c587-4d46-47d9-896b-543e1944b1c1" Oct 31 01:36:37.432373 env[1250]: time="2025-10-31T01:36:37.432162455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 01:36:37.810754 env[1250]: time="2025-10-31T01:36:37.810704738Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:36:37.821156 env[1250]: time="2025-10-31T01:36:37.821097876Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 01:36:37.877193 kubelet[2113]: E1031 01:36:37.873333 2113 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:36:37.891667 kubelet[2113]: E1031 01:36:37.891618 2113 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 01:36:37.920013 kubelet[2113]: E1031 01:36:37.919935 2113 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5mgfl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-vvvhd_calico-system(37cef8c3-ac2b-4e5e-92c5-b48103b3c543): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 01:36:37.921233 kubelet[2113]: E1031 01:36:37.921205 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-vvvhd" podUID="37cef8c3-ac2b-4e5e-92c5-b48103b3c543" Oct 31 01:36:38.344451 sshd[5006]: pam_unix(sshd:session): session closed for user core Oct 31 01:36:38.352000 audit[5006]: USER_END pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:38.352000 audit[5006]: CRED_DISP pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:38.359595 kernel: audit: type=1106 audit(1761874598.352:1437): pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:38.373367 kernel: audit: type=1104 audit(1761874598.352:1438): pid=5006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 31 01:36:38.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.108:22-147.75.109.163:55536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:36:38.379037 systemd[1]: sshd@19-139.178.70.108:22-147.75.109.163:55536.service: Deactivated successfully. Oct 31 01:36:38.379625 systemd[1]: session-22.scope: Deactivated successfully. Oct 31 01:36:38.380172 systemd-logind[1237]: Session 22 logged out. Waiting for processes to exit. Oct 31 01:36:38.381104 systemd-logind[1237]: Removed session 22. Oct 31 01:36:40.416950 kubelet[2113]: E1031 01:36:40.416891 2113 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-hszfb" podUID="47a38da1-fd15-4cb6-9f0a-aefa44fb658a"